builder: fx-team_win8_64-debug_test-web-platform-tests-9
slave: t-w864-ix-138
starttime: 1477635779.74
results: success (0)
buildid: 20161027204059
builduid: 2f3236c65ebc4b2c9e1688325cc65b49
revision: 71536044069576fc877bf7ef0ba13a4ada793706
========= Started set props: master (results: 0, elapsed: 0 secs) (at 2016-10-27 23:22:59.737906) =========
master: http://buildbot-master119.bb.releng.scl3.mozilla.com:8201/
========= Finished set props: master (results: 0, elapsed: 0 secs) (at 2016-10-27 23:22:59.738347) =========
========= Started downloading to buildprops.json (results: 0, elapsed: 0 secs) (at 2016-10-27 23:22:59.738643) =========
========= Finished downloading to buildprops.json (results: 0, elapsed: 0 secs) (at 2016-10-27 23:22:59.909329) =========
========= Started 'bash -c ...' (results: 0, elapsed: 1 secs) (at 2016-10-27 23:22:59.909726) =========
'bash' '-c' 'wget -Oarchiver_client.py --no-check-certificate --tries=10 --waitretry=3 https://hg.mozilla.org/build/tools/raw-file/default/buildfarm/utils/archiver_client.py'
in dir C:\slave\test\. (timeout 1200 secs)
watching logfiles {}
argv: ['bash', '-c', 'wget -Oarchiver_client.py --no-check-certificate --tries=10 --waitretry=3 https://hg.mozilla.org/build/tools/raw-file/default/buildfarm/utils/archiver_client.py']
environment:
ALLUSERSPROFILE=C:\ProgramData
APPDATA=C:\Users\cltbld.T-W864-IX-138\AppData\Roaming
COMMONPROGRAMFILES=C:\Program Files (x86)\Common Files
COMMONPROGRAMFILES(X86)=C:\Program Files (x86)\Common Files
COMMONPROGRAMW6432=C:\Program Files\Common Files
COMPUTERNAME=T-W864-IX-138
COMSPEC=C:\windows\system32\cmd.exe
DCLOCATION=SCL3
DNSSUFFIX=wintest.releng.scl3.mozilla.com
FP_NO_HOST_CHECK=NO
HOMEDRIVE=C:
HOMEPATH=\Users\cltbld.T-W864-IX-138
KTS_HOME=C:\Program Files\KTS
KTS_VERSION=1.19c
LOCALAPPDATA=C:\Users\cltbld.T-W864-IX-138\AppData\Local
LOGONSERVER=\\T-W864-IX-138
MONDIR=C:\Monitor_config\
MOZBUILDDIR=C:\mozilla-build\
NUMBER_OF_PROCESSORS=8
OS=Windows_NT
OURDRIVE=C:
PATH=C:\Program Files (x86)\NVIDIA Corporation\PhysX\Common;C:\windows\system32;C:\windows;C:\windows\System32\Wbem;C:\windows\System32\WindowsPowerShell\v1.0\;C:\mozilla-build\python27;C:\mozilla-build\python27\Scripts;C:\mozilla-build\msys\bin;C:\mozilla-build\vim\vim72;C:\mozilla-build\wget;C:\mozilla-build\info-zip;C:\CoreUtils\bin;C:\mozilla-build\buildbotve\scripts;C:\mozilla-build\hg
PATHEXT=.COM;.EXE;.BAT;.CMD;.VBS;.VBE;.JS;.JSE;.WSF;.WSH;.MSC
PROCESSOR_ARCHITECTURE=x86
PROCESSOR_ARCHITEW6432=AMD64
PROCESSOR_IDENTIFIER=Intel64 Family 6 Model 30 Stepping 5, GenuineIntel
PROCESSOR_LEVEL=6
PROCESSOR_REVISION=1e05
PROGRAMDATA=C:\ProgramData
PROGRAMFILES=C:\Program Files (x86)
PROGRAMFILES(X86)=C:\Program Files (x86)
PROGRAMW6432=C:\Program Files
PROMPT=$P$G
PSMODULEPATH=C:\windows\system32\WindowsPowerShell\v1.0\Modules\
PUBLIC=C:\Users\Public
PWD=C:\slave\test
RUNLOGFILE=C:\slave\\runslave.log
SLAVEDIR=C:\slave\
SYSTEMDRIVE=C:
SYSTEMROOT=C:\windows
TEMP=C:\Users\CLTBLD~1.T-W\AppData\Local\Temp
TEST1=testie
TMP=C:\Users\CLTBLD~1.T-W\AppData\Local\Temp
USERDOMAIN=T-W864-IX-138
USERDOMAIN_ROAMINGPROFILE=T-W864-IX-138
USERNAME=cltbld
USERPROFILE=C:\Users\cltbld.T-W864-IX-138
WINDIR=C:\windows
using PTY: False
--23:23:00-- https://hg.mozilla.org/build/tools/raw-file/default/buildfarm/utils/archiver_client.py
=> `archiver_client.py'
Resolving hg.mozilla.org... 63.245.215.25, 63.245.215.102
Connecting to hg.mozilla.org|63.245.215.25|:443... connected.
WARNING: Certificate verification error for hg.mozilla.org: certificate signature failure
HTTP request sent, awaiting response... 200 Script output follows
Length: 12,179 (12K) [text/x-python]
0K .......... . 100% 7.31 MB/s
23:23:00 (7.31 MB/s) - `archiver_client.py' saved [12179/12179]
program finished with exit code 0
elapsedTime=1.312000
========= master_lag: 0.04 =========
========= Finished 'bash -c ...' (results: 0, elapsed: 1 secs) (at 2016-10-27 23:23:01.258129) =========
========= Started 'rm -rf ...' (results: 0, elapsed: 3 secs) (at 2016-10-27 23:23:01.258560) =========
'rm' '-rf' 'scripts' 'properties'
in dir C:\slave\test\. (timeout 1200 secs)
watching logfiles {}
argv: ['rm', '-rf', 'scripts', 'properties']
environment:
ALLUSERSPROFILE=C:\ProgramData
APPDATA=C:\Users\cltbld.T-W864-IX-138\AppData\Roaming
COMMONPROGRAMFILES=C:\Program Files (x86)\Common Files
COMMONPROGRAMFILES(X86)=C:\Program Files (x86)\Common Files
COMMONPROGRAMW6432=C:\Program Files\Common Files
COMPUTERNAME=T-W864-IX-138
COMSPEC=C:\windows\system32\cmd.exe
DCLOCATION=SCL3
DNSSUFFIX=wintest.releng.scl3.mozilla.com
FP_NO_HOST_CHECK=NO
HOMEDRIVE=C:
HOMEPATH=\Users\cltbld.T-W864-IX-138
KTS_HOME=C:\Program Files\KTS
KTS_VERSION=1.19c
LOCALAPPDATA=C:\Users\cltbld.T-W864-IX-138\AppData\Local
LOGONSERVER=\\T-W864-IX-138
MONDIR=C:\Monitor_config\
MOZBUILDDIR=C:\mozilla-build\
NUMBER_OF_PROCESSORS=8
OS=Windows_NT
OURDRIVE=C:
PATH=C:\Program Files (x86)\NVIDIA Corporation\PhysX\Common;C:\windows\system32;C:\windows;C:\windows\System32\Wbem;C:\windows\System32\WindowsPowerShell\v1.0\;C:\mozilla-build\python27;C:\mozilla-build\python27\Scripts;C:\mozilla-build\msys\bin;C:\mozilla-build\vim\vim72;C:\mozilla-build\wget;C:\mozilla-build\info-zip;C:\CoreUtils\bin;C:\mozilla-build\buildbotve\scripts;C:\mozilla-build\hg
PATHEXT=.COM;.EXE;.BAT;.CMD;.VBS;.VBE;.JS;.JSE;.WSF;.WSH;.MSC
PROCESSOR_ARCHITECTURE=x86
PROCESSOR_ARCHITEW6432=AMD64
PROCESSOR_IDENTIFIER=Intel64 Family 6 Model 30 Stepping 5, GenuineIntel
PROCESSOR_LEVEL=6
PROCESSOR_REVISION=1e05
PROGRAMDATA=C:\ProgramData
PROGRAMFILES=C:\Program Files (x86)
PROGRAMFILES(X86)=C:\Program Files (x86)
PROGRAMW6432=C:\Program Files
PROMPT=$P$G
PSMODULEPATH=C:\windows\system32\WindowsPowerShell\v1.0\Modules\
PUBLIC=C:\Users\Public
PWD=C:\slave\test
RUNLOGFILE=C:\slave\\runslave.log
SLAVEDIR=C:\slave\
SYSTEMDRIVE=C:
SYSTEMROOT=C:\windows
TEMP=C:\Users\CLTBLD~1.T-W\AppData\Local\Temp
TEST1=testie
TMP=C:\Users\CLTBLD~1.T-W\AppData\Local\Temp
USERDOMAIN=T-W864-IX-138
USERDOMAIN_ROAMINGPROFILE=T-W864-IX-138
USERNAME=cltbld
USERPROFILE=C:\Users\cltbld.T-W864-IX-138
WINDIR=C:\windows
using PTY: False
program finished with exit code 0
elapsedTime=3.716000
========= master_lag: 0.02 =========
========= Finished 'rm -rf ...' (results: 0, elapsed: 3 secs) (at 2016-10-27 23:23:04.989609) =========
========= Started 'bash -c ...' (results: 0, elapsed: 1 secs) (at 2016-10-27 23:23:04.989979) =========
'bash' '-c' u'python archiver_client.py mozharness --repo integration/fx-team --rev 71536044069576fc877bf7ef0ba13a4ada793706 --destination scripts --debug'
in dir C:\slave\test\. (timeout 1200 secs)
watching logfiles {}
argv: ['bash', '-c', u'python archiver_client.py mozharness --repo integration/fx-team --rev 71536044069576fc877bf7ef0ba13a4ada793706 --destination scripts --debug']
environment:
ALLUSERSPROFILE=C:\ProgramData
APPDATA=C:\Users\cltbld.T-W864-IX-138\AppData\Roaming
COMMONPROGRAMFILES=C:\Program Files (x86)\Common Files
COMMONPROGRAMFILES(X86)=C:\Program Files (x86)\Common Files
COMMONPROGRAMW6432=C:\Program Files\Common Files
COMPUTERNAME=T-W864-IX-138
COMSPEC=C:\windows\system32\cmd.exe
DCLOCATION=SCL3
DNSSUFFIX=wintest.releng.scl3.mozilla.com
FP_NO_HOST_CHECK=NO
HOMEDRIVE=C:
HOMEPATH=\Users\cltbld.T-W864-IX-138
KTS_HOME=C:\Program Files\KTS
KTS_VERSION=1.19c
LOCALAPPDATA=C:\Users\cltbld.T-W864-IX-138\AppData\Local
LOGONSERVER=\\T-W864-IX-138
MONDIR=C:\Monitor_config\
MOZBUILDDIR=C:\mozilla-build\
NUMBER_OF_PROCESSORS=8
OS=Windows_NT
OURDRIVE=C:
PATH=C:\Program Files (x86)\NVIDIA Corporation\PhysX\Common;C:\windows\system32;C:\windows;C:\windows\System32\Wbem;C:\windows\System32\WindowsPowerShell\v1.0\;C:\mozilla-build\python27;C:\mozilla-build\python27\Scripts;C:\mozilla-build\msys\bin;C:\mozilla-build\vim\vim72;C:\mozilla-build\wget;C:\mozilla-build\info-zip;C:\CoreUtils\bin;C:\mozilla-build\buildbotve\scripts;C:\mozilla-build\hg
PATHEXT=.COM;.EXE;.BAT;.CMD;.VBS;.VBE;.JS;.JSE;.WSF;.WSH;.MSC
PROCESSOR_ARCHITECTURE=x86
PROCESSOR_ARCHITEW6432=AMD64
PROCESSOR_IDENTIFIER=Intel64 Family 6 Model 30 Stepping 5, GenuineIntel
PROCESSOR_LEVEL=6
PROCESSOR_REVISION=1e05
PROGRAMDATA=C:\ProgramData
PROGRAMFILES=C:\Program Files (x86)
PROGRAMFILES(X86)=C:\Program Files (x86)
PROGRAMW6432=C:\Program Files
PROMPT=$P$G
PSMODULEPATH=C:\windows\system32\WindowsPowerShell\v1.0\Modules\
PUBLIC=C:\Users\Public
PWD=C:\slave\test
RUNLOGFILE=C:\slave\\runslave.log
SLAVEDIR=C:\slave\
SYSTEMDRIVE=C:
SYSTEMROOT=C:\windows
TEMP=C:\Users\CLTBLD~1.T-W\AppData\Local\Temp
TEST1=testie
TMP=C:\Users\CLTBLD~1.T-W\AppData\Local\Temp
USERDOMAIN=T-W864-IX-138
USERDOMAIN_ROAMINGPROFILE=T-W864-IX-138
USERNAME=cltbld
USERPROFILE=C:\Users\cltbld.T-W864-IX-138
WINDIR=C:\windows
using PTY: False
2016-10-27 23:23:04,713 truncating revision to first 12 chars
2016-10-27 23:23:04,713 Setting DEBUG logging.
2016-10-27 23:23:04,713 attempt 1/10
2016-10-27 23:23:04,713 Getting archive location from https://api.pub.build.mozilla.org/archiver/hgmo/integration/fx-team/715360440695?&preferred_region=us-west-2&suffix=tar.gz&subdir=testing/mozharness
2016-10-27 23:23:05,262 unpacking tar archive at: fx-team-715360440695/testing/mozharness/
2016-10-27 23:23:05,361 skipping symlink on windows: configs/single_locale/linux32.py
program finished with exit code 0
elapsedTime=1.167000
========= master_lag: 0.05 =========
========= Finished 'bash -c ...' (results: 0, elapsed: 1 secs) (at 2016-10-27 23:23:06.211006) =========
========= Started set props: script_repo_revision (results: 0, elapsed: 0 secs) (at 2016-10-27 23:23:06.211329) =========
script_repo_revision: 71536044069576fc877bf7ef0ba13a4ada793706
========= Finished set props: script_repo_revision (results: 0, elapsed: 0 secs) (at 2016-10-27 23:23:06.211751) =========
========= Started downloading to oauth.txt (results: 0, elapsed: 0 secs) (at 2016-10-27 23:23:06.212020) =========
========= Finished downloading to oauth.txt (results: 0, elapsed: 0 secs) (at 2016-10-27 23:23:06.252605) =========
========= Started 'c:/mozilla-build/python27/python -u ...' (results: 0, elapsed: 1 hrs, 2 mins, 33 secs) (at 2016-10-27 23:23:06.252950) =========
'c:/mozilla-build/python27/python' '-u' 'scripts/scripts/web_platform_tests.py' '--cfg' 'web_platform_tests/prod_config_windows.py' '--test-type=testharness' '--total-chunks' '10' '--this-chunk' '9' '--blob-upload-branch' 'fx-team' '--download-symbols' 'true'
in dir C:\slave\test\. (timeout 1800 secs) (maxTime 7200 secs)
watching logfiles {}
argv: ['c:/mozilla-build/python27/python', '-u', 'scripts/scripts/web_platform_tests.py', '--cfg', 'web_platform_tests/prod_config_windows.py', '--test-type=testharness', '--total-chunks', '10', '--this-chunk', '9', '--blob-upload-branch', 'fx-team', '--download-symbols', 'true']
environment:
ALLUSERSPROFILE=C:\ProgramData
APPDATA=C:\Users\cltbld.T-W864-IX-138\AppData\Roaming
COMMONPROGRAMFILES=C:\Program Files (x86)\Common Files
COMMONPROGRAMFILES(X86)=C:\Program Files (x86)\Common Files
COMMONPROGRAMW6432=C:\Program Files\Common Files
COMPUTERNAME=T-W864-IX-138
COMSPEC=C:\windows\system32\cmd.exe
DCLOCATION=SCL3
DNSSUFFIX=wintest.releng.scl3.mozilla.com
FP_NO_HOST_CHECK=NO
HOMEDRIVE=C:
HOMEPATH=\Users\cltbld.T-W864-IX-138
KTS_HOME=C:\Program Files\KTS
KTS_VERSION=1.19c
LOCALAPPDATA=C:\Users\cltbld.T-W864-IX-138\AppData\Local
LOGONSERVER=\\T-W864-IX-138
MONDIR=C:\Monitor_config\
MOZBUILDDIR=C:\mozilla-build\
MOZ_CRASHREPORTER_NO_REPORT=1
MOZ_HIDE_RESULTS_TABLE=1
MOZ_NO_REMOTE=1
NO_EM_RESTART=1
NO_FAIL_ON_TEST_ERRORS=1
NUMBER_OF_PROCESSORS=8
OS=Windows_NT
OURDRIVE=C:
PATH=C:\Program Files (x86)\NVIDIA Corporation\PhysX\Common;C:\windows\system32;C:\windows;C:\windows\System32\Wbem;C:\windows\System32\WindowsPowerShell\v1.0\;C:\mozilla-build\python27;C:\mozilla-build\python27\Scripts;C:\mozilla-build\msys\bin;C:\mozilla-build\vim\vim72;C:\mozilla-build\wget;C:\mozilla-build\info-zip;C:\CoreUtils\bin;C:\mozilla-build\buildbotve\scripts;C:\mozilla-build\hg
PATHEXT=.COM;.EXE;.BAT;.CMD;.VBS;.VBE;.JS;.JSE;.WSF;.WSH;.MSC
PROCESSOR_ARCHITECTURE=x86
PROCESSOR_ARCHITEW6432=AMD64
PROCESSOR_IDENTIFIER=Intel64 Family 6 Model 30 Stepping 5, GenuineIntel
PROCESSOR_LEVEL=6
PROCESSOR_REVISION=1e05
PROGRAMDATA=C:\ProgramData
PROGRAMFILES=C:\Program Files (x86)
PROGRAMFILES(X86)=C:\Program Files (x86)
PROGRAMW6432=C:\Program Files
PROMPT=$P$G
PROPERTIES_FILE=C:\slave\test/buildprops.json
PSMODULEPATH=C:\windows\system32\WindowsPowerShell\v1.0\Modules\
PUBLIC=C:\Users\Public
PWD=C:\slave\test
RUNLOGFILE=C:\slave\\runslave.log
SLAVEDIR=C:\slave\
SYSTEMDRIVE=C:
SYSTEMROOT=C:\windows
TEMP=C:\Users\CLTBLD~1.T-W\AppData\Local\Temp
TEST1=testie
TMP=C:\Users\CLTBLD~1.T-W\AppData\Local\Temp
USERDOMAIN=T-W864-IX-138
USERDOMAIN_ROAMINGPROFILE=T-W864-IX-138
USERNAME=cltbld
USERPROFILE=C:\Users\cltbld.T-W864-IX-138
WINDIR=C:\windows
XPCOM_DEBUG_BREAK=warn
using PTY: False
23:23:06 INFO - MultiFileLogger online at 20161027 23:23:06 in C:\slave\test
23:23:06 INFO - Run as scripts/scripts/web_platform_tests.py --cfg web_platform_tests/prod_config_windows.py --test-type=testharness --total-chunks 10 --this-chunk 9 --blob-upload-branch fx-team --download-symbols true
23:23:06 INFO - Dumping config to C:\slave\test\logs\localconfig.json.
23:23:06 INFO - {'allow_software_gl_layers': False,
23:23:06 INFO - 'append_to_log': False,
23:23:06 INFO - 'base_work_dir': 'C:\\slave\\test',
23:23:06 INFO - 'blob_upload_branch': 'fx-team',
23:23:06 INFO - 'blob_uploader_auth_file': 'C:\\slave\\test\\oauth.txt',
23:23:06 INFO - 'buildbot_json_path': 'buildprops.json',
23:23:06 INFO - 'config_files': ('web_platform_tests/prod_config_windows.py',),
23:23:06 INFO - 'default_blob_upload_servers': ('https://blobupload.elasticbeanstalk.com',),
23:23:06 INFO - 'download_minidump_stackwalk': True,
23:23:06 INFO - 'download_symbols': 'true',
23:23:06 INFO - 'e10s': False,
23:23:06 INFO - 'exes': {'hg': 'c:/mozilla-build/hg/hg',
23:23:06 INFO - 'mozinstall': ('C:\\slave\\test/build/venv/scripts/python',
23:23:06 INFO - 'C:\\slave\\test/build/venv/scripts/mozinstall-script.py'),
23:23:06 INFO - 'python': 'c:\\mozilla-build\\python27\\python.exe',
23:23:06 INFO - 'tooltool.py': ('c:\\mozilla-build\\python27\\python.exe',
23:23:06 INFO - 'C:/mozilla-build/tooltool.py'),
23:23:06 INFO - 'virtualenv': ('c:\\mozilla-build\\python27\\python.exe',
23:23:06 INFO - 'c:/mozilla-build/buildbotve/virtualenv.py')},
23:23:06 INFO - 'find_links': ('http://pypi.pvt.build.mozilla.org/pub',
23:23:06 INFO - 'http://pypi.pub.build.mozilla.org/pub'),
23:23:06 INFO - 'log_level': 'info',
23:23:06 INFO - 'log_to_console': True,
23:23:06 INFO - 'opt_config_files': (),
23:23:06 INFO - 'options': ('--prefs-root=%(test_path)s/prefs',
23:23:06 INFO - '--processes=1',
23:23:06 INFO - '--config=%(test_path)s/wptrunner.ini',
23:23:06 INFO - '--ca-cert-path=%(test_path)s/certs/cacert.pem',
23:23:06 INFO - '--host-key-path=%(test_path)s/certs/web-platform.test.key',
23:23:06 INFO - '--host-cert-path=%(test_path)s/certs/web-platform.test.pem',
23:23:06 INFO - '--certutil-binary=%(test_install_path)s/bin/certutil'),
23:23:06 INFO - 'pip_index': False,
23:23:06 INFO - 'require_test_zip': True,
23:23:06 INFO - 'test_type': ('testharness',),
23:23:06 INFO - 'this_chunk': '9',
23:23:06 INFO - 'total_chunks': '10',
23:23:06 INFO - 'virtualenv_path': 'venv',
23:23:06 INFO - 'volatile_config': {'actions': None, 'add_actions': None, 'no_actions': None},
23:23:06 INFO - 'work_dir': 'build'}
23:23:06 INFO - [mozharness: 2016-10-28 06:23:06.090000Z] Running clobber step.
23:23:06 INFO - Running pre-action listener: _resource_record_pre_action
23:23:06 INFO - Running main action method: clobber
23:23:06 INFO - rmtree: C:\slave\test\build
23:23:06 INFO - Using _rmtree_windows ...
23:23:06 INFO - retry: Calling _rmtree_windows with args: ('C:\\slave\\test\\build',), kwargs: {}, attempt #1
23:24:44 INFO - Running post-action listener: _resource_record_post_action
23:24:44 INFO - [mozharness: 2016-10-28 06:24:44.428000Z] Finished clobber step (success)
23:24:44 INFO - [mozharness: 2016-10-28 06:24:44.428000Z] Running read-buildbot-config step.
23:24:44 INFO - Running pre-action listener: _resource_record_pre_action
23:24:44 INFO - Running main action method: read_buildbot_config
23:24:44 INFO - Using buildbot properties:
23:24:44 INFO - {
23:24:44 INFO - "project": "",
23:24:44 INFO - "product": "firefox",
23:24:44 INFO - "script_repo_revision": "production",
23:24:44 INFO - "scheduler": "tests-fx-team-win8_64-debug-unittest-8-3600",
23:24:44 INFO - "repository": "",
23:24:44 INFO - "buildername": "Windows 8 64-bit fx-team debug test web-platform-tests-9",
23:24:44 INFO - "buildid": "20161027204059",
23:24:44 INFO - "pgo_build": "False",
23:24:44 INFO - "basedir": "C:\\slave\\test",
23:24:44 INFO - "buildnumber": 20,
23:24:44 INFO - "slavename": "t-w864-ix-138",
23:24:44 INFO - "revision": "71536044069576fc877bf7ef0ba13a4ada793706",
23:24:44 INFO - "master": "http://buildbot-master119.bb.releng.scl3.mozilla.com:8201/",
23:24:44 INFO - "platform": "win64",
23:24:44 INFO - "branch": "fx-team",
23:24:44 INFO - "repo_path": "integration/fx-team",
23:24:44 INFO - "moz_repo_path": "",
23:24:44 INFO - "stage_platform": "win64",
23:24:44 INFO - "builduid": "2f3236c65ebc4b2c9e1688325cc65b49",
23:24:44 INFO - "slavebuilddir": "test"
23:24:44 INFO - }
23:24:44 INFO - Found a test packages url https://queue.taskcluster.net/v1/task/OLoLuKTcRWO4heHcpf7N8A/artifacts/public/build/firefox-52.0a1.en-US.win64.test_packages.json.
23:24:44 INFO - Found installer url https://queue.taskcluster.net/v1/task/OLoLuKTcRWO4heHcpf7N8A/artifacts/public/build/firefox-52.0a1.en-US.win64.zip.
23:24:44 INFO - Running post-action listener: _resource_record_post_action
23:24:44 INFO - [mozharness: 2016-10-28 06:24:44.431000Z] Finished read-buildbot-config step (success)
23:24:44 INFO - [mozharness: 2016-10-28 06:24:44.432000Z] Running download-and-extract step.
23:24:44 INFO - Running pre-action listener: _resource_record_pre_action
23:24:44 INFO - Running main action method: download_and_extract
23:24:44 INFO - mkdir: C:\slave\test\build\tests
23:24:44 INFO - proxxy config: {'regions': ['.use1.', '.usw2.', '.scl3'], 'instances': ['proxxy1.srv.releng.use1.mozilla.com', 'proxxy1.srv.releng.usw2.mozilla.com', 'proxxy1.srv.releng.scl3.mozilla.com'], 'urls': [('http://ftp.mozilla.org', 'ftp.mozilla.org'), ('https://ftp.mozilla.org', 'ftp.mozilla.org'), ('https://ftp-ssl.mozilla.org', 'ftp.mozilla.org'), ('http://pypi.pvt.build.mozilla.org', 'pypi.pvt.build.mozilla.org'), ('http://pypi.pub.build.mozilla.org', 'pypi.pub.build.mozilla.org')]}
23:24:44 INFO - trying https://queue.taskcluster.net/v1/task/OLoLuKTcRWO4heHcpf7N8A/artifacts/public/build/firefox-52.0a1.en-US.win64.test_packages.json
23:24:44 INFO - Downloading https://queue.taskcluster.net/v1/task/OLoLuKTcRWO4heHcpf7N8A/artifacts/public/build/firefox-52.0a1.en-US.win64.test_packages.json to C:\slave\test\build\firefox-52.0a1.en-US.win64.test_packages.json
23:24:44 INFO - retry: Calling _download_file with args: (), kwargs: {'url': 'https://queue.taskcluster.net/v1/task/OLoLuKTcRWO4heHcpf7N8A/artifacts/public/build/firefox-52.0a1.en-US.win64.test_packages.json', 'file_name': 'C:\\slave\\test\\build\\firefox-52.0a1.en-US.win64.test_packages.json'}, attempt #1
23:24:45 INFO - Downloaded 1274 bytes.
23:24:45 INFO - Reading from file C:\slave\test\build\firefox-52.0a1.en-US.win64.test_packages.json
23:24:45 INFO - Using the following test package requirements:
23:24:45 INFO - {u'common': [u'firefox-52.0a1.en-US.win64.common.tests.zip'],
23:24:45 INFO - u'cppunittest': [u'firefox-52.0a1.en-US.win64.common.tests.zip',
23:24:45 INFO - u'firefox-52.0a1.en-US.win64.cppunittest.tests.zip'],
23:24:45 INFO - u'gtest': [u'firefox-52.0a1.en-US.win64.common.tests.zip',
23:24:45 INFO - u'firefox-52.0a1.en-US.win64.gtest.tests.zip'],
23:24:45 INFO - u'jittest': [u'firefox-52.0a1.en-US.win64.common.tests.zip',
23:24:45 INFO - u'jsshell-win64.zip'],
23:24:45 INFO - u'mochitest': [u'firefox-52.0a1.en-US.win64.common.tests.zip',
23:24:45 INFO - u'firefox-52.0a1.en-US.win64.mochitest.tests.zip'],
23:24:45 INFO - u'mozbase': [u'firefox-52.0a1.en-US.win64.common.tests.zip'],
23:24:45 INFO - u'reftest': [u'firefox-52.0a1.en-US.win64.common.tests.zip',
23:24:45 INFO - u'firefox-52.0a1.en-US.win64.reftest.tests.zip'],
23:24:45 INFO - u'talos': [u'firefox-52.0a1.en-US.win64.common.tests.zip',
23:24:45 INFO - u'firefox-52.0a1.en-US.win64.talos.tests.zip'],
23:24:45 INFO - u'web-platform': [u'firefox-52.0a1.en-US.win64.common.tests.zip',
23:24:45 INFO - u'firefox-52.0a1.en-US.win64.web-platform.tests.zip'],
23:24:45 INFO - u'xpcshell': [u'firefox-52.0a1.en-US.win64.common.tests.zip',
23:24:45 INFO - u'firefox-52.0a1.en-US.win64.xpcshell.tests.zip']}
23:24:45 INFO - Downloading packages: [u'firefox-52.0a1.en-US.win64.common.tests.zip', u'firefox-52.0a1.en-US.win64.web-platform.tests.zip'] for test suite category: web-platform
23:24:45 INFO - Downloading and extracting to C:\slave\test\build\tests these dirs bin/*, config/*, mozbase/*, marionette/*, tools/wptserve/*, web-platform/* from https://queue.taskcluster.net/v1/task/OLoLuKTcRWO4heHcpf7N8A/artifacts/public/build/firefox-52.0a1.en-US.win64.common.tests.zip
23:24:45 INFO - retry: Calling fetch_url_into_memory with args: (), kwargs: {'url': u'https://queue.taskcluster.net/v1/task/OLoLuKTcRWO4heHcpf7N8A/artifacts/public/build/firefox-52.0a1.en-US.win64.common.tests.zip'}, attempt #1
23:24:45 INFO - Fetch https://queue.taskcluster.net/v1/task/OLoLuKTcRWO4heHcpf7N8A/artifacts/public/build/firefox-52.0a1.en-US.win64.common.tests.zip into memory
23:24:45 INFO - Http code: 200
23:24:45 INFO - via: 1.1 66ed69e8b47ad05050331602c798132f.cloudfront.net (CloudFront)
23:24:45 INFO - x-amz-cf-id: NmyrsgBmzyV_DJwSzezQczuYB6uNwfy5vvud59olzdV2WHEvQ3CgZQ==
23:24:45 INFO - x-amz-version-id: ZtX0V74HUPPqEsejKdaa4wLLyHK1ajpB
23:24:46 INFO - Expected file size: 19604999
23:24:46 INFO - Obtained file size: 19604999
23:24:47 INFO - Downloading and extracting to C:\slave\test\build\tests these dirs bin/*, config/*, mozbase/*, marionette/*, tools/wptserve/*, web-platform/* from https://queue.taskcluster.net/v1/task/OLoLuKTcRWO4heHcpf7N8A/artifacts/public/build/firefox-52.0a1.en-US.win64.web-platform.tests.zip
23:24:47 INFO - retry: Calling fetch_url_into_memory with args: (), kwargs: {'url': u'https://queue.taskcluster.net/v1/task/OLoLuKTcRWO4heHcpf7N8A/artifacts/public/build/firefox-52.0a1.en-US.win64.web-platform.tests.zip'}, attempt #1
23:24:47 INFO - Fetch https://queue.taskcluster.net/v1/task/OLoLuKTcRWO4heHcpf7N8A/artifacts/public/build/firefox-52.0a1.en-US.win64.web-platform.tests.zip into memory
23:24:47 INFO - Http code: 200
23:24:47 INFO - via: 1.1 6cd88b9fd84ad5daa3b3867fb8c5c91a.cloudfront.net (CloudFront)
23:24:47 INFO - x-amz-cf-id: gERCOuNohntr9-Kbs8rato_Ij73GdvhW-QmqmQSUUdCRbgqpR21cng==
23:24:47 INFO - x-amz-version-id: Q2l8i2QfFmiqWA3vmK06A6g7gvLARkVG
23:24:48 INFO - Expected file size: 43222964
23:24:48 INFO - Obtained file size: 43222964
23:25:33 INFO - proxxy config: {'regions': ['.use1.', '.usw2.', '.scl3'], 'instances': ['proxxy1.srv.releng.use1.mozilla.com', 'proxxy1.srv.releng.usw2.mozilla.com', 'proxxy1.srv.releng.scl3.mozilla.com'], 'urls': [('http://ftp.mozilla.org', 'ftp.mozilla.org'), ('https://ftp.mozilla.org', 'ftp.mozilla.org'), ('https://ftp-ssl.mozilla.org', 'ftp.mozilla.org'), ('http://pypi.pvt.build.mozilla.org', 'pypi.pvt.build.mozilla.org'), ('http://pypi.pub.build.mozilla.org', 'pypi.pub.build.mozilla.org')]}
23:25:33 INFO - trying https://queue.taskcluster.net/v1/task/OLoLuKTcRWO4heHcpf7N8A/artifacts/public/build/firefox-52.0a1.en-US.win64.zip
23:25:33 INFO - Downloading https://queue.taskcluster.net/v1/task/OLoLuKTcRWO4heHcpf7N8A/artifacts/public/build/firefox-52.0a1.en-US.win64.zip to C:\slave\test\build\firefox-52.0a1.en-US.win64.zip
23:25:33 INFO - retry: Calling _download_file with args: (), kwargs: {'url': 'https://queue.taskcluster.net/v1/task/OLoLuKTcRWO4heHcpf7N8A/artifacts/public/build/firefox-52.0a1.en-US.win64.zip', 'file_name': 'C:\\slave\\test\\build\\firefox-52.0a1.en-US.win64.zip'}, attempt #1
23:25:35 INFO - Downloaded 78935231 bytes.
23:25:35 INFO - Setting buildbot property build_url to https://queue.taskcluster.net/v1/task/OLoLuKTcRWO4heHcpf7N8A/artifacts/public/build/firefox-52.0a1.en-US.win64.zip
23:25:35 INFO - mkdir: C:\slave\test\properties
23:25:35 INFO - Writing buildbot properties ['build_url'] to C:\slave\test\properties\build_url
23:25:35 INFO - Writing to file C:\slave\test\properties\build_url
23:25:35 INFO - Contents:
23:25:35 INFO - build_url:https://queue.taskcluster.net/v1/task/OLoLuKTcRWO4heHcpf7N8A/artifacts/public/build/firefox-52.0a1.en-US.win64.zip
23:25:35 INFO - retry: Calling query_symbols_url with args: (), kwargs: {}, attempt #1
23:25:36 INFO - Setting buildbot property symbols_url to https://queue.taskcluster.net/v1/task/OLoLuKTcRWO4heHcpf7N8A/artifacts/public/build/firefox-52.0a1.en-US.win64.crashreporter-symbols.zip
23:25:36 INFO - Writing buildbot properties ['symbols_url'] to C:\slave\test\properties\symbols_url
23:25:36 INFO - Writing to file C:\slave\test\properties\symbols_url
23:25:36 INFO - Contents:
23:25:36 INFO - symbols_url:https://queue.taskcluster.net/v1/task/OLoLuKTcRWO4heHcpf7N8A/artifacts/public/build/firefox-52.0a1.en-US.win64.crashreporter-symbols.zip
23:25:36 INFO - Downloading and extracting to C:\slave\test\build\symbols these dirs * from https://queue.taskcluster.net/v1/task/OLoLuKTcRWO4heHcpf7N8A/artifacts/public/build/firefox-52.0a1.en-US.win64.crashreporter-symbols.zip
23:25:36 INFO - retry: Calling fetch_url_into_memory with args: (), kwargs: {'url': 'https://queue.taskcluster.net/v1/task/OLoLuKTcRWO4heHcpf7N8A/artifacts/public/build/firefox-52.0a1.en-US.win64.crashreporter-symbols.zip'}, attempt #1
23:25:36 INFO - Fetch https://queue.taskcluster.net/v1/task/OLoLuKTcRWO4heHcpf7N8A/artifacts/public/build/firefox-52.0a1.en-US.win64.crashreporter-symbols.zip into memory
23:25:36 INFO - Http code: 200
23:25:36 INFO - via: 1.1 73fa5a1ee49cf827e596b502b5927eab.cloudfront.net (CloudFront)
23:25:36 INFO - x-amz-cf-id: QASL3pCApoSPrZgG5u6dpKXHocbN3j6Ek6E6uXbiFlB0W0Rq3f69wA==
23:25:36 INFO - x-amz-version-id: wsAWzpS1YcEq3Bl2AX5LTz0XvryND9Jv
23:25:37 INFO - Expected file size: 57154506
23:25:37 INFO - Obtained file size: 57154506
23:25:46 INFO - Running post-action listener: _resource_record_post_action
23:25:46 INFO - Running post-action listener: set_extra_try_arguments
23:25:46 INFO - [mozharness: 2016-10-28 06:25:46.400000Z] Finished download-and-extract step (success)
23:25:46 INFO - [mozharness: 2016-10-28 06:25:46.400000Z] Running fetch-geckodriver step.
23:25:46 INFO - Running pre-action listener: _resource_record_pre_action
23:25:46 INFO - Running main action method: fetch_geckodriver
23:25:46 INFO - Running post-action listener: _resource_record_post_action
23:25:46 INFO - [mozharness: 2016-10-28 06:25:46.401000Z] Finished fetch-geckodriver step (success)
23:25:46 INFO - [mozharness: 2016-10-28 06:25:46.401000Z] Running create-virtualenv step.
23:25:46 INFO - Running pre-action listener: _pre_create_virtualenv
23:25:46 INFO - Running pre-action listener: _resource_record_pre_action
23:25:46 INFO - Running main action method: create_virtualenv
23:25:46 INFO - Creating virtualenv C:\slave\test\build\venv
23:25:46 INFO - Running command: ['c:\\mozilla-build\\python27\\python.exe', 'c:/mozilla-build/buildbotve/virtualenv.py', '--no-site-packages', '--distribute', 'C:\\slave\\test\\build\\venv'] in C:\slave\test\build
23:25:46 INFO - Copy/paste: c:\mozilla-build\python27\python.exe c:/mozilla-build/buildbotve/virtualenv.py --no-site-packages --distribute C:\slave\test\build\venv
23:25:50 INFO - New python executable in C:\slave\test\build\venv\Scripts\python.exe
23:25:56 INFO - Installing distribute......................................................................................................................................................................................done.
23:25:58 INFO - Return code: 0
23:25:58 INFO - Getting output from command: ['C:\\slave\\test\\build\\venv\\Scripts\\pip', '--version']
23:25:58 INFO - Copy/paste: C:\slave\test\build\venv\Scripts\pip --version
23:25:58 INFO - Reading from file tmpfile_stdout
23:25:58 INFO - Output received:
23:25:58 INFO - pip 0.8.2 from c:\slave\test\build\venv\lib\site-packages\pip-0.8.2-py2.7.egg (python 2.7)
23:25:58 INFO - Using _rmtree_windows ...
23:25:58 INFO - Using _rmtree_windows ...
23:25:58 INFO - Installing psutil>=3.1.1 into virtualenv C:\slave\test\build\venv
23:25:58 INFO - proxxy config: {'regions': ['.use1.', '.usw2.', '.scl3'], 'instances': ['proxxy1.srv.releng.use1.mozilla.com', 'proxxy1.srv.releng.usw2.mozilla.com', 'proxxy1.srv.releng.scl3.mozilla.com'], 'urls': [('http://ftp.mozilla.org', 'ftp.mozilla.org'), ('https://ftp.mozilla.org', 'ftp.mozilla.org'), ('https://ftp-ssl.mozilla.org', 'ftp.mozilla.org'), ('http://pypi.pvt.build.mozilla.org', 'pypi.pvt.build.mozilla.org'), ('http://pypi.pub.build.mozilla.org', 'pypi.pub.build.mozilla.org')]}
23:25:58 INFO - http://pypi.pvt.build.mozilla.org/pub matches http://pypi.pvt.build.mozilla.org
23:25:58 INFO - proxxy config: {'regions': ['.use1.', '.usw2.', '.scl3'], 'instances': ['proxxy1.srv.releng.use1.mozilla.com', 'proxxy1.srv.releng.usw2.mozilla.com', 'proxxy1.srv.releng.scl3.mozilla.com'], 'urls': [('http://ftp.mozilla.org', 'ftp.mozilla.org'), ('https://ftp.mozilla.org', 'ftp.mozilla.org'), ('https://ftp-ssl.mozilla.org', 'ftp.mozilla.org'), ('http://pypi.pvt.build.mozilla.org', 'pypi.pvt.build.mozilla.org'), ('http://pypi.pub.build.mozilla.org', 'pypi.pub.build.mozilla.org')]}
23:25:58 INFO - http://pypi.pub.build.mozilla.org/pub matches http://pypi.pub.build.mozilla.org
23:25:58 INFO - retry: Calling run_command with args: [['C:\\slave\\test\\build\\venv\\Scripts\\pip', 'install', '--timeout', '120', '--no-index', '--find-links', 'http://pypi.pvt.build.mozilla.org/pub', '--find-links', 'http://pypi.pub.build.mozilla.org/pub', 'psutil>=3.1.1']], kwargs: {'error_level': 'warning', 'error_list': [{'substr': 'not found or a compiler error:', 'level': 'warning'}, {'regex': <_sre.SRE_Pattern object at 0x02574250>, 'level': 'error'}, {'regex': <_sre.SRE_Pattern object at 0x02589188>, 'level': 'warning'}, {'regex': <_sre.SRE_Pattern object at 0x025B0AC0>, 'level': 'debug'}, {'substr': 'command not found', 'level': 'error'}, {'regex': <_sre.SRE_Pattern object at 0x006F8DE8>, 'level': 'warning'}, {'substr': 'Traceback (most recent call last)', 'level': 'error'}, {'substr': 'SyntaxError: ', 'level': 'error'}, {'substr': 'TypeError: ', 'level': 'error'}, {'substr': 'NameError: ', 'level': 'error'}, {'substr': 'ZeroDivisionError: ', 'level': 'error'}, {'regex': <_sre.SRE_Pattern object at 0x024FF230>, 'level': 'critical'}, {'regex': <_sre.SRE_Pattern object at 0x0257D520>, 'level': 'critical'}], 'cwd': 'C:\\slave\\test\\build', 'env': {'TMP': 'C:\\Users\\CLTBLD~1.T-W\\AppData\\Local\\Temp', 'TEST1': 'testie', 'COMPUTERNAME': 'T-W864-IX-138', 'USERDOMAIN': 'T-W864-IX-138', 'KTS_VERSION': '1.19c', 'PSMODULEPATH': 'C:\\windows\\system32\\WindowsPowerShell\\v1.0\\Modules\\', 'COMMONPROGRAMFILES': 'C:\\Program Files (x86)\\Common Files', 'PROCESSOR_IDENTIFIER': 'Intel64 Family 6 Model 30 Stepping 5, GenuineIntel', 'PROGRAMFILES': 'C:\\Program Files (x86)', 'PROCESSOR_REVISION': '1e05', 'DNSSUFFIX': 'wintest.releng.scl3.mozilla.com', 'SYSTEMROOT': 'C:\\windows', 'NO_EM_RESTART': '1', 'PROGRAMFILES(X86)': 'C:\\Program Files (x86)', 'OURDRIVE': 'C:', 'MOZ_HIDE_RESULTS_TABLE': '1', 'XPCOM_DEBUG_BREAK': 'warn', 'MONDIR': 'C:\\Monitor_config\\', 'TEMP': 'C:\\Users\\CLTBLD~1.T-W\\AppData\\Local\\Temp', 'COMMONPROGRAMFILES(X86)': 'C:\\Program Files (x86)\\Common Files', 'RUNLOGFILE': 'C:\\slave\\\\runslave.log', 'PROCESSOR_ARCHITECTURE': 'x86', 'ALLUSERSPROFILE': 'C:\\ProgramData', 'USERPROFILE': 'C:\\Users\\cltbld.T-W864-IX-138', 'LOCALAPPDATA': 'C:\\Users\\cltbld.T-W864-IX-138\\AppData\\Local', 'HOMEPATH': '\\Users\\cltbld.T-W864-IX-138', 'USERDOMAIN_ROAMINGPROFILE': 'T-W864-IX-138', 'MOZBUILDDIR': 'C:\\mozilla-build\\', 'PROGRAMW6432': 'C:\\Program Files', 'USERNAME': 'cltbld', 'LOGONSERVER': '\\\\T-W864-IX-138', 'MOZ_NO_REMOTE': '1', 'COMSPEC': 'C:\\windows\\system32\\cmd.exe', 'PROGRAMDATA': 'C:\\ProgramData', 'PROPERTIES_FILE': 'C:\\slave\\test/buildprops.json', 'PATH': 'C:\\Program Files (x86)\\NVIDIA Corporation\\PhysX\\Common;C:\\windows\\system32;C:\\windows;C:\\windows\\System32\\Wbem;C:\\windows\\System32\\WindowsPowerShell\\v1.0\\;C:\\mozilla-build\\python27;C:\\mozilla-build\\python27\\Scripts;C:\\mozilla-build\\msys\\bin;C:\\mozilla-build\\vim\\vim72;C:\\mozilla-build\\wget;C:\\mozilla-build\\info-zip;C:\\CoreUtils\\bin;C:\\mozilla-build\\buildbotve\\scripts;C:\\mozilla-build\\hg', 'PROMPT': '$P$G', 'NO_FAIL_ON_TEST_ERRORS': '1', 'PATHEXT': '.COM;.EXE;.BAT;.CMD;.VBS;.VBE;.JS;.JSE;.WSF;.WSH;.MSC', 'FP_NO_HOST_CHECK': 'NO', 'DCLOCATION': 'SCL3', 'APPDATA': 'C:\\Users\\cltbld.T-W864-IX-138\\AppData\\Roaming', 'HOMEDRIVE': 'C:', 'SYSTEMDRIVE': 'C:', 'SLAVEDIR': 'C:\\slave\\', 'NUMBER_OF_PROCESSORS': '8', 'PWD': 'C:\\slave\\test', 'PROCESSOR_LEVEL': '6', 'KTS_HOME': 'C:\\Program Files\\KTS', 'PROCESSOR_ARCHITEW6432': 'AMD64', 'MOZ_CRASHREPORTER_NO_REPORT': '1', 'COMMONPROGRAMW6432': 'C:\\Program Files\\Common Files', 'OS': 'Windows_NT', 'PUBLIC': 'C:\\Users\\Public', 'WINDIR': 'C:\\windows'}}, attempt #1
23:25:58 INFO - Running command: ['C:\\slave\\test\\build\\venv\\Scripts\\pip', 'install', '--timeout', '120', '--no-index', '--find-links', 'http://pypi.pvt.build.mozilla.org/pub', '--find-links', 'http://pypi.pub.build.mozilla.org/pub', 'psutil>=3.1.1'] in C:\slave\test\build
23:25:58 INFO - Copy/paste: C:\slave\test\build\venv\Scripts\pip install --timeout 120 --no-index --find-links http://pypi.pvt.build.mozilla.org/pub --find-links http://pypi.pub.build.mozilla.org/pub psutil>=3.1.1
23:25:58 INFO - Using env: {'ALLUSERSPROFILE': 'C:\\ProgramData',
23:25:58 INFO - 'APPDATA': 'C:\\Users\\cltbld.T-W864-IX-138\\AppData\\Roaming',
23:25:58 INFO - 'COMMONPROGRAMFILES': 'C:\\Program Files (x86)\\Common Files',
23:25:58 INFO - 'COMMONPROGRAMFILES(X86)': 'C:\\Program Files (x86)\\Common Files',
23:25:58 INFO - 'COMMONPROGRAMW6432': 'C:\\Program Files\\Common Files',
23:25:58 INFO - 'COMPUTERNAME': 'T-W864-IX-138',
23:25:58 INFO - 'COMSPEC': 'C:\\windows\\system32\\cmd.exe',
23:25:58 INFO - 'DCLOCATION': 'SCL3',
23:25:58 INFO - 'DNSSUFFIX': 'wintest.releng.scl3.mozilla.com',
23:25:58 INFO - 'FP_NO_HOST_CHECK': 'NO',
23:25:58 INFO - 'HOMEDRIVE': 'C:',
23:25:58 INFO - 'HOMEPATH': '\\Users\\cltbld.T-W864-IX-138',
23:25:58 INFO - 'KTS_HOME': 'C:\\Program Files\\KTS',
23:25:58 INFO - 'KTS_VERSION': '1.19c',
23:25:58 INFO - 'LOCALAPPDATA': 'C:\\Users\\cltbld.T-W864-IX-138\\AppData\\Local',
23:25:58 INFO - 'LOGONSERVER': '\\\\T-W864-IX-138',
23:25:58 INFO - 'MONDIR': 'C:\\Monitor_config\\',
23:25:58 INFO - 'MOZBUILDDIR': 'C:\\mozilla-build\\',
23:25:58 INFO - 'MOZ_CRASHREPORTER_NO_REPORT': '1',
23:25:58 INFO - 'MOZ_HIDE_RESULTS_TABLE': '1',
23:25:58 INFO - 'MOZ_NO_REMOTE': '1',
23:25:58 INFO - 'NO_EM_RESTART': '1',
23:25:58 INFO - 'NO_FAIL_ON_TEST_ERRORS': '1',
23:25:58 INFO - 'NUMBER_OF_PROCESSORS': '8',
23:25:58 INFO - 'OS': 'Windows_NT',
23:25:58 INFO - 'OURDRIVE': 'C:',
23:25:58 INFO - 'PATH': 'C:\\Program Files (x86)\\NVIDIA Corporation\\PhysX\\Common;C:\\windows\\system32;C:\\windows;C:\\windows\\System32\\Wbem;C:\\windows\\System32\\WindowsPowerShell\\v1.0\\;C:\\mozilla-build\\python27;C:\\mozilla-build\\python27\\Scripts;C:\\mozilla-build\\msys\\bin;C:\\mozilla-build\\vim\\vim72;C:\\mozilla-build\\wget;C:\\mozilla-build\\info-zip;C:\\CoreUtils\\bin;C:\\mozilla-build\\buildbotve\\scripts;C:\\mozilla-build\\hg',
23:25:58 INFO - 'PATHEXT': '.COM;.EXE;.BAT;.CMD;.VBS;.VBE;.JS;.JSE;.WSF;.WSH;.MSC',
23:25:58 INFO - 'PROCESSOR_ARCHITECTURE': 'x86',
23:25:58 INFO - 'PROCESSOR_ARCHITEW6432': 'AMD64',
23:25:58 INFO - 'PROCESSOR_IDENTIFIER': 'Intel64 Family 6 Model 30 Stepping 5, GenuineIntel',
23:25:58 INFO - 'PROCESSOR_LEVEL': '6',
23:25:58 INFO - 'PROCESSOR_REVISION': '1e05',
23:25:58 INFO - 'PROGRAMDATA': 'C:\\ProgramData',
23:25:58 INFO - 'PROGRAMFILES': 'C:\\Program Files (x86)',
23:25:58 INFO - 'PROGRAMFILES(X86)': 'C:\\Program Files (x86)',
23:25:58 INFO - 'PROGRAMW6432': 'C:\\Program Files',
23:25:58 INFO - 'PROMPT': '$P$G',
23:25:58 INFO - 'PROPERTIES_FILE': 'C:\\slave\\test/buildprops.json',
23:25:58 INFO - 'PSMODULEPATH': 'C:\\windows\\system32\\WindowsPowerShell\\v1.0\\Modules\\',
23:25:58 INFO - 'PUBLIC': 'C:\\Users\\Public',
23:25:58 INFO - 'PWD': 'C:\\slave\\test',
23:25:58 INFO - 'RUNLOGFILE': 'C:\\slave\\\\runslave.log',
23:25:58 INFO - 'SLAVEDIR': 'C:\\slave\\',
23:25:58 INFO - 'SYSTEMDRIVE': 'C:',
23:25:58 INFO - 'SYSTEMROOT': 'C:\\windows',
23:25:58 INFO - 'TEMP': 'C:\\Users\\CLTBLD~1.T-W\\AppData\\Local\\Temp',
23:25:58 INFO - 'TEST1': 'testie',
23:25:58 INFO - 'TMP': 'C:\\Users\\CLTBLD~1.T-W\\AppData\\Local\\Temp',
23:25:58 INFO - 'USERDOMAIN': 'T-W864-IX-138',
23:25:58 INFO - 'USERDOMAIN_ROAMINGPROFILE': 'T-W864-IX-138',
23:25:58 INFO - 'USERNAME': 'cltbld',
23:25:58 INFO - 'USERPROFILE': 'C:\\Users\\cltbld.T-W864-IX-138',
23:25:58 INFO - 'WINDIR': 'C:\\windows',
23:25:58 INFO - 'XPCOM_DEBUG_BREAK': 'warn'}
23:25:59 INFO - Ignoring indexes: http://pypi.python.org/simple/
23:25:59 INFO - Downloading/unpacking psutil>=3.1.1
23:25:59 INFO - Running setup.py egg_info for package psutil
23:25:59 INFO - warning: no previously-included files matching '*' found under directory 'docs\_build'
23:25:59 INFO - warning: manifest_maker: MANIFEST.in, line 18: 'recursive-include' expects
...
23:25:59 INFO - Installing collected packages: psutil
23:25:59 INFO - Running setup.py install for psutil
23:25:59 INFO - building 'psutil._psutil_windows' extension
23:25:59 INFO - error: Unable to find vcvarsall.bat
23:25:59 INFO - Complete output from command C:\slave\test\build\venv\Scripts\python.exe -c "import setuptools;__file__='C:\\slave\\test\\build\\venv\\build\\psutil\\setup.py';execfile(__file__)" install --single-version-externally-managed --record c:\users\cltbld~1.t-w\appdata\local\temp\pip-5njtvl-record\install-record.txt --install-headers C:\slave\test\build\venv\include\site\python2.7:
23:25:59 INFO - running install
23:25:59 INFO - running build
23:25:59 INFO - running build_py
23:25:59 INFO - creating build
23:25:59 INFO - creating build\lib.win32-2.7
23:25:59 INFO - creating build\lib.win32-2.7\psutil
23:25:59 INFO - copying psutil\_common.py -> build\lib.win32-2.7\psutil
23:25:59 INFO - copying psutil\_compat.py -> build\lib.win32-2.7\psutil
23:25:59 INFO - copying psutil\_psbsd.py -> build\lib.win32-2.7\psutil
23:25:59 INFO - copying psutil\_pslinux.py -> build\lib.win32-2.7\psutil
23:25:59 INFO - copying psutil\_psosx.py -> build\lib.win32-2.7\psutil
23:25:59 INFO - copying psutil\_psposix.py -> build\lib.win32-2.7\psutil
23:25:59 INFO - copying psutil\_pssunos.py -> build\lib.win32-2.7\psutil
23:25:59 INFO - copying psutil\_pswindows.py -> build\lib.win32-2.7\psutil
23:25:59 INFO - copying psutil\__init__.py -> build\lib.win32-2.7\psutil
23:25:59 INFO - running build_ext
23:25:59 INFO - building 'psutil._psutil_windows' extension
23:25:59 INFO - error: Unable to find vcvarsall.bat
23:25:59 INFO - ----------------------------------------
23:25:59 INFO - Command C:\slave\test\build\venv\Scripts\python.exe -c "import setuptools;__file__='C:\\slave\\test\\build\\venv\\build\\psutil\\setup.py';execfile(__file__)" install --single-version-externally-managed --record c:\users\cltbld~1.t-w\appdata\local\temp\pip-5njtvl-record\install-record.txt --install-headers C:\slave\test\build\venv\include\site\python2.7 failed with error code 1
23:25:59 INFO - Storing complete log in C:\Users\cltbld.T-W864-IX-138\AppData\Roaming\pip\pip.log
23:25:59 WARNING - Return code: 1
23:25:59 WARNING - Could not install python package: C:\slave\test\build\venv\Scripts\pip install --timeout 120 --no-index --find-links http://pypi.pvt.build.mozilla.org/pub --find-links http://pypi.pub.build.mozilla.org/pub psutil>=3.1.1 failed after 1 tries!
23:25:59 INFO - Installing mozsystemmonitor==0.3 into virtualenv C:\slave\test\build\venv
23:25:59 INFO - proxxy config: {'regions': ['.use1.', '.usw2.', '.scl3'], 'instances': ['proxxy1.srv.releng.use1.mozilla.com', 'proxxy1.srv.releng.usw2.mozilla.com', 'proxxy1.srv.releng.scl3.mozilla.com'], 'urls': [('http://ftp.mozilla.org', 'ftp.mozilla.org'), ('https://ftp.mozilla.org', 'ftp.mozilla.org'), ('https://ftp-ssl.mozilla.org', 'ftp.mozilla.org'), ('http://pypi.pvt.build.mozilla.org', 'pypi.pvt.build.mozilla.org'), ('http://pypi.pub.build.mozilla.org', 'pypi.pub.build.mozilla.org')]}
23:25:59 INFO - http://pypi.pvt.build.mozilla.org/pub matches http://pypi.pvt.build.mozilla.org
23:25:59 INFO - proxxy config: {'regions': ['.use1.', '.usw2.', '.scl3'], 'instances': ['proxxy1.srv.releng.use1.mozilla.com', 'proxxy1.srv.releng.usw2.mozilla.com', 'proxxy1.srv.releng.scl3.mozilla.com'], 'urls': [('http://ftp.mozilla.org', 'ftp.mozilla.org'), ('https://ftp.mozilla.org', 'ftp.mozilla.org'), ('https://ftp-ssl.mozilla.org', 'ftp.mozilla.org'), ('http://pypi.pvt.build.mozilla.org', 'pypi.pvt.build.mozilla.org'), ('http://pypi.pub.build.mozilla.org', 'pypi.pub.build.mozilla.org')]}
23:26:00 INFO - http://pypi.pub.build.mozilla.org/pub matches http://pypi.pub.build.mozilla.org
23:26:00 INFO - retry: Calling run_command with args: [['C:\\slave\\test\\build\\venv\\Scripts\\pip', 'install', '--timeout', '120', '--no-index', '--find-links', 'http://pypi.pvt.build.mozilla.org/pub', '--find-links', 'http://pypi.pub.build.mozilla.org/pub', 'mozsystemmonitor==0.3']], kwargs: {'error_level': 'warning', 'error_list': [{'substr': 'not found or a compiler error:', 'level': 'warning'}, {'regex': <_sre.SRE_Pattern object at 0x02574250>, 'level': 'error'}, {'regex': <_sre.SRE_Pattern object at 0x02589188>, 'level': 'warning'}, {'regex': <_sre.SRE_Pattern object at 0x025B0AC0>, 'level': 'debug'}, {'substr': 'command not found', 'level': 'error'}, {'regex': <_sre.SRE_Pattern object at 0x006F8DE8>, 'level': 'warning'}, {'substr': 'Traceback (most recent call last)', 'level': 'error'}, {'substr': 'SyntaxError: ', 'level': 'error'}, {'substr': 'TypeError: ', 'level': 'error'}, {'substr': 'NameError: ', 'level': 'error'}, {'substr': 'ZeroDivisionError: ', 'level': 'error'}, {'regex': <_sre.SRE_Pattern object at 0x024FF230>, 'level': 'critical'}, {'regex': <_sre.SRE_Pattern object at 0x0257D520>, 'level': 'critical'}], 'cwd': 'C:\\slave\\test\\build', 'env': {'TMP': 'C:\\Users\\CLTBLD~1.T-W\\AppData\\Local\\Temp', 'TEST1': 'testie', 'COMPUTERNAME': 'T-W864-IX-138', 'USERDOMAIN': 'T-W864-IX-138', 'KTS_VERSION': '1.19c', 'PSMODULEPATH': 'C:\\windows\\system32\\WindowsPowerShell\\v1.0\\Modules\\', 'COMMONPROGRAMFILES': 'C:\\Program Files (x86)\\Common Files', 'PROCESSOR_IDENTIFIER': 'Intel64 Family 6 Model 30 Stepping 5, GenuineIntel', 'PROGRAMFILES': 'C:\\Program Files (x86)', 'PROCESSOR_REVISION': '1e05', 'DNSSUFFIX': 'wintest.releng.scl3.mozilla.com', 'SYSTEMROOT': 'C:\\windows', 'NO_EM_RESTART': '1', 'PROGRAMFILES(X86)': 'C:\\Program Files (x86)', 'OURDRIVE': 'C:', 'MOZ_HIDE_RESULTS_TABLE': '1', 'XPCOM_DEBUG_BREAK': 'warn', 'MONDIR': 'C:\\Monitor_config\\', 'TEMP': 'C:\\Users\\CLTBLD~1.T-W\\AppData\\Local\\Temp', 'COMMONPROGRAMFILES(X86)': 'C:\\Program Files (x86)\\Common Files', 'RUNLOGFILE': 'C:\\slave\\\\runslave.log', 'PROCESSOR_ARCHITECTURE': 'x86', 'ALLUSERSPROFILE': 'C:\\ProgramData', 'USERPROFILE': 'C:\\Users\\cltbld.T-W864-IX-138', 'LOCALAPPDATA': 'C:\\Users\\cltbld.T-W864-IX-138\\AppData\\Local', 'HOMEPATH': '\\Users\\cltbld.T-W864-IX-138', 'USERDOMAIN_ROAMINGPROFILE': 'T-W864-IX-138', 'MOZBUILDDIR': 'C:\\mozilla-build\\', 'PROGRAMW6432': 'C:\\Program Files', 'USERNAME': 'cltbld', 'LOGONSERVER': '\\\\T-W864-IX-138', 'MOZ_NO_REMOTE': '1', 'COMSPEC': 'C:\\windows\\system32\\cmd.exe', 'PROGRAMDATA': 'C:\\ProgramData', 'PROPERTIES_FILE': 'C:\\slave\\test/buildprops.json', 'PATH': 'C:\\Program Files (x86)\\NVIDIA Corporation\\PhysX\\Common;C:\\windows\\system32;C:\\windows;C:\\windows\\System32\\Wbem;C:\\windows\\System32\\WindowsPowerShell\\v1.0\\;C:\\mozilla-build\\python27;C:\\mozilla-build\\python27\\Scripts;C:\\mozilla-build\\msys\\bin;C:\\mozilla-build\\vim\\vim72;C:\\mozilla-build\\wget;C:\\mozilla-build\\info-zip;C:\\CoreUtils\\bin;C:\\mozilla-build\\buildbotve\\scripts;C:\\mozilla-build\\hg', 'PROMPT': '$P$G', 'NO_FAIL_ON_TEST_ERRORS': '1', 'PATHEXT': '.COM;.EXE;.BAT;.CMD;.VBS;.VBE;.JS;.JSE;.WSF;.WSH;.MSC', 'FP_NO_HOST_CHECK': 'NO', 'DCLOCATION': 'SCL3', 'APPDATA': 'C:\\Users\\cltbld.T-W864-IX-138\\AppData\\Roaming', 'HOMEDRIVE': 'C:', 'SYSTEMDRIVE': 'C:', 'SLAVEDIR': 'C:\\slave\\', 'NUMBER_OF_PROCESSORS': '8', 'PWD': 'C:\\slave\\test', 'PROCESSOR_LEVEL': '6', 'KTS_HOME': 'C:\\Program Files\\KTS', 'PROCESSOR_ARCHITEW6432': 'AMD64', 'MOZ_CRASHREPORTER_NO_REPORT': '1', 'COMMONPROGRAMW6432': 'C:\\Program Files\\Common Files', 'OS': 'Windows_NT', 'PUBLIC': 'C:\\Users\\Public', 'WINDIR': 'C:\\windows'}}, attempt #1
23:26:00 INFO - Running command: ['C:\\slave\\test\\build\\venv\\Scripts\\pip', 'install', '--timeout', '120', '--no-index', '--find-links', 'http://pypi.pvt.build.mozilla.org/pub', '--find-links', 'http://pypi.pub.build.mozilla.org/pub', 'mozsystemmonitor==0.3'] in C:\slave\test\build
23:26:00 INFO - Copy/paste: C:\slave\test\build\venv\Scripts\pip install --timeout 120 --no-index --find-links http://pypi.pvt.build.mozilla.org/pub --find-links http://pypi.pub.build.mozilla.org/pub mozsystemmonitor==0.3
23:26:00 INFO - Using env: {'ALLUSERSPROFILE': 'C:\\ProgramData',
23:26:00 INFO - 'APPDATA': 'C:\\Users\\cltbld.T-W864-IX-138\\AppData\\Roaming',
23:26:00 INFO - 'COMMONPROGRAMFILES': 'C:\\Program Files (x86)\\Common Files',
23:26:00 INFO - 'COMMONPROGRAMFILES(X86)': 'C:\\Program Files (x86)\\Common Files',
23:26:00 INFO - 'COMMONPROGRAMW6432': 'C:\\Program Files\\Common Files',
23:26:00 INFO - 'COMPUTERNAME': 'T-W864-IX-138',
23:26:00 INFO - 'COMSPEC': 'C:\\windows\\system32\\cmd.exe',
23:26:00 INFO - 'DCLOCATION': 'SCL3',
23:26:00 INFO - 'DNSSUFFIX': 'wintest.releng.scl3.mozilla.com',
23:26:00 INFO - 'FP_NO_HOST_CHECK': 'NO',
23:26:00 INFO - 'HOMEDRIVE': 'C:',
23:26:00 INFO - 'HOMEPATH': '\\Users\\cltbld.T-W864-IX-138',
23:26:00 INFO - 'KTS_HOME': 'C:\\Program Files\\KTS',
23:26:00 INFO - 'KTS_VERSION': '1.19c',
23:26:00 INFO - 'LOCALAPPDATA': 'C:\\Users\\cltbld.T-W864-IX-138\\AppData\\Local',
23:26:00 INFO - 'LOGONSERVER': '\\\\T-W864-IX-138',
23:26:00 INFO - 'MONDIR': 'C:\\Monitor_config\\',
23:26:00 INFO - 'MOZBUILDDIR': 'C:\\mozilla-build\\',
23:26:00 INFO - 'MOZ_CRASHREPORTER_NO_REPORT': '1',
23:26:00 INFO - 'MOZ_HIDE_RESULTS_TABLE': '1',
23:26:00 INFO - 'MOZ_NO_REMOTE': '1',
23:26:00 INFO - 'NO_EM_RESTART': '1',
23:26:00 INFO - 'NO_FAIL_ON_TEST_ERRORS': '1',
23:26:00 INFO - 'NUMBER_OF_PROCESSORS': '8',
23:26:00 INFO - 'OS': 'Windows_NT',
23:26:00 INFO - 'OURDRIVE': 'C:',
23:26:00 INFO - 'PATH': 'C:\\Program Files (x86)\\NVIDIA Corporation\\PhysX\\Common;C:\\windows\\system32;C:\\windows;C:\\windows\\System32\\Wbem;C:\\windows\\System32\\WindowsPowerShell\\v1.0\\;C:\\mozilla-build\\python27;C:\\mozilla-build\\python27\\Scripts;C:\\mozilla-build\\msys\\bin;C:\\mozilla-build\\vim\\vim72;C:\\mozilla-build\\wget;C:\\mozilla-build\\info-zip;C:\\CoreUtils\\bin;C:\\mozilla-build\\buildbotve\\scripts;C:\\mozilla-build\\hg',
23:26:00 INFO - 'PATHEXT': '.COM;.EXE;.BAT;.CMD;.VBS;.VBE;.JS;.JSE;.WSF;.WSH;.MSC',
23:26:00 INFO - 'PROCESSOR_ARCHITECTURE': 'x86',
23:26:00 INFO - 'PROCESSOR_ARCHITEW6432': 'AMD64',
23:26:00 INFO - 'PROCESSOR_IDENTIFIER': 'Intel64 Family 6 Model 30 Stepping 5, GenuineIntel',
23:26:00 INFO - 'PROCESSOR_LEVEL': '6',
23:26:00 INFO - 'PROCESSOR_REVISION': '1e05',
23:26:00 INFO - 'PROGRAMDATA': 'C:\\ProgramData',
23:26:00 INFO - 'PROGRAMFILES': 'C:\\Program Files (x86)',
23:26:00 INFO - 'PROGRAMFILES(X86)': 'C:\\Program Files (x86)',
23:26:00 INFO - 'PROGRAMW6432': 'C:\\Program Files',
23:26:00 INFO - 'PROMPT': '$P$G',
23:26:00 INFO - 'PROPERTIES_FILE': 'C:\\slave\\test/buildprops.json',
23:26:00 INFO - 'PSMODULEPATH': 'C:\\windows\\system32\\WindowsPowerShell\\v1.0\\Modules\\',
23:26:00 INFO - 'PUBLIC': 'C:\\Users\\Public',
23:26:00 INFO - 'PWD': 'C:\\slave\\test',
23:26:00 INFO - 'RUNLOGFILE': 'C:\\slave\\\\runslave.log',
23:26:00 INFO - 'SLAVEDIR': 'C:\\slave\\',
23:26:00 INFO - 'SYSTEMDRIVE': 'C:',
23:26:00 INFO - 'SYSTEMROOT': 'C:\\windows',
23:26:00 INFO - 'TEMP': 'C:\\Users\\CLTBLD~1.T-W\\AppData\\Local\\Temp',
23:26:00 INFO - 'TEST1': 'testie',
23:26:00 INFO - 'TMP': 'C:\\Users\\CLTBLD~1.T-W\\AppData\\Local\\Temp',
23:26:00 INFO - 'USERDOMAIN': 'T-W864-IX-138',
23:26:00 INFO - 'USERDOMAIN_ROAMINGPROFILE': 'T-W864-IX-138',
23:26:00 INFO - 'USERNAME': 'cltbld',
23:26:00 INFO - 'USERPROFILE': 'C:\\Users\\cltbld.T-W864-IX-138',
23:26:00 INFO - 'WINDIR': 'C:\\windows',
23:26:00 INFO - 'XPCOM_DEBUG_BREAK': 'warn'}
23:26:03 INFO - Ignoring indexes: http://pypi.python.org/simple/
23:26:03 INFO - Downloading/unpacking mozsystemmonitor==0.3
23:26:03 INFO - Downloading mozsystemmonitor-0.3.tar.gz
23:26:03 INFO - Running setup.py egg_info for package mozsystemmonitor
23:26:03 INFO - Downloading/unpacking psutil>=3.1.1 (from mozsystemmonitor==0.3)
23:26:03 INFO - Running setup.py egg_info for package psutil
23:26:03 INFO - warning: no previously-included files matching '*' found under directory 'docs\_build'
23:26:03 INFO - warning: manifest_maker: MANIFEST.in, line 18: 'recursive-include' expects ...
23:26:03 INFO - Installing collected packages: mozsystemmonitor, psutil
23:26:03 INFO - Running setup.py install for mozsystemmonitor
23:26:03 INFO - Running setup.py install for psutil
23:26:03 INFO - building 'psutil._psutil_windows' extension
23:26:03 INFO - error: Unable to find vcvarsall.bat
23:26:03 INFO - Complete output from command C:\slave\test\build\venv\Scripts\python.exe -c "import setuptools;__file__='C:\\slave\\test\\build\\venv\\build\\psutil\\setup.py';execfile(__file__)" install --single-version-externally-managed --record c:\users\cltbld~1.t-w\appdata\local\temp\pip-gk6pgw-record\install-record.txt --install-headers C:\slave\test\build\venv\include\site\python2.7:
23:26:03 INFO - running install
23:26:03 INFO - running build
23:26:03 INFO - running build_py
23:26:03 INFO - running build_ext
23:26:03 INFO - building 'psutil._psutil_windows' extension
23:26:03 INFO - error: Unable to find vcvarsall.bat
23:26:03 INFO - ----------------------------------------
23:26:03 INFO - Command C:\slave\test\build\venv\Scripts\python.exe -c "import setuptools;__file__='C:\\slave\\test\\build\\venv\\build\\psutil\\setup.py';execfile(__file__)" install --single-version-externally-managed --record c:\users\cltbld~1.t-w\appdata\local\temp\pip-gk6pgw-record\install-record.txt --install-headers C:\slave\test\build\venv\include\site\python2.7 failed with error code 1
23:26:03 INFO - Storing complete log in C:\Users\cltbld.T-W864-IX-138\AppData\Roaming\pip\pip.log
23:26:03 WARNING - Return code: 1
23:26:03 WARNING - Could not install python package: C:\slave\test\build\venv\Scripts\pip install --timeout 120 --no-index --find-links http://pypi.pvt.build.mozilla.org/pub --find-links http://pypi.pub.build.mozilla.org/pub mozsystemmonitor==0.3 failed after 1 tries!
23:26:03 INFO - Installing jsonschema==2.5.1 into virtualenv C:\slave\test\build\venv
23:26:03 INFO - proxxy config: {'regions': ['.use1.', '.usw2.', '.scl3'], 'instances': ['proxxy1.srv.releng.use1.mozilla.com', 'proxxy1.srv.releng.usw2.mozilla.com', 'proxxy1.srv.releng.scl3.mozilla.com'], 'urls': [('http://ftp.mozilla.org', 'ftp.mozilla.org'), ('https://ftp.mozilla.org', 'ftp.mozilla.org'), ('https://ftp-ssl.mozilla.org', 'ftp.mozilla.org'), ('http://pypi.pvt.build.mozilla.org', 'pypi.pvt.build.mozilla.org'), ('http://pypi.pub.build.mozilla.org', 'pypi.pub.build.mozilla.org')]}
23:26:03 INFO - http://pypi.pvt.build.mozilla.org/pub matches http://pypi.pvt.build.mozilla.org
23:26:03 INFO - proxxy config: {'regions': ['.use1.', '.usw2.', '.scl3'], 'instances': ['proxxy1.srv.releng.use1.mozilla.com', 'proxxy1.srv.releng.usw2.mozilla.com', 'proxxy1.srv.releng.scl3.mozilla.com'], 'urls': [('http://ftp.mozilla.org', 'ftp.mozilla.org'), ('https://ftp.mozilla.org', 'ftp.mozilla.org'), ('https://ftp-ssl.mozilla.org', 'ftp.mozilla.org'), ('http://pypi.pvt.build.mozilla.org', 'pypi.pvt.build.mozilla.org'), ('http://pypi.pub.build.mozilla.org', 'pypi.pub.build.mozilla.org')]}
23:26:03 INFO - http://pypi.pub.build.mozilla.org/pub matches http://pypi.pub.build.mozilla.org
23:26:03 INFO - retry: Calling run_command with args: [['C:\\slave\\test\\build\\venv\\Scripts\\pip', 'install', '--timeout', '120', '--no-index', '--find-links', 'http://pypi.pvt.build.mozilla.org/pub', '--find-links', 'http://pypi.pub.build.mozilla.org/pub', 'jsonschema==2.5.1']], kwargs: {'error_level': 'warning', 'error_list': [{'substr': 'not found or a compiler error:', 'level': 'warning'}, {'regex': <_sre.SRE_Pattern object at 0x02574250>, 'level': 'error'}, {'regex': <_sre.SRE_Pattern object at 0x02589188>, 'level': 'warning'}, {'regex': <_sre.SRE_Pattern object at 0x025B0AC0>, 'level': 'debug'}, {'substr': 'command not found', 'level': 'error'}, {'regex': <_sre.SRE_Pattern object at 0x006F8DE8>, 'level': 'warning'}, {'substr': 'Traceback (most recent call last)', 'level': 'error'}, {'substr': 'SyntaxError: ', 'level': 'error'}, {'substr': 'TypeError: ', 'level': 'error'}, {'substr': 'NameError: ', 'level': 'error'}, {'substr': 'ZeroDivisionError: ', 'level': 'error'}, {'regex': <_sre.SRE_Pattern object at 0x024FF230>, 'level': 'critical'}, {'regex': <_sre.SRE_Pattern object at 0x0257D520>, 'level': 'critical'}], 'cwd': 'C:\\slave\\test\\build', 'env': {'TMP': 'C:\\Users\\CLTBLD~1.T-W\\AppData\\Local\\Temp', 'TEST1': 'testie', 'COMPUTERNAME': 'T-W864-IX-138', 'USERDOMAIN': 'T-W864-IX-138', 'KTS_VERSION': '1.19c', 'PSMODULEPATH': 'C:\\windows\\system32\\WindowsPowerShell\\v1.0\\Modules\\', 'COMMONPROGRAMFILES': 'C:\\Program Files (x86)\\Common Files', 'PROCESSOR_IDENTIFIER': 'Intel64 Family 6 Model 30 Stepping 5, GenuineIntel', 'PROGRAMFILES': 'C:\\Program Files (x86)', 'PROCESSOR_REVISION': '1e05', 'DNSSUFFIX': 'wintest.releng.scl3.mozilla.com', 'SYSTEMROOT': 'C:\\windows', 'NO_EM_RESTART': '1', 'PROGRAMFILES(X86)': 'C:\\Program Files (x86)', 'OURDRIVE': 'C:', 'MOZ_HIDE_RESULTS_TABLE': '1', 'XPCOM_DEBUG_BREAK': 'warn', 'MONDIR': 'C:\\Monitor_config\\', 'TEMP': 'C:\\Users\\CLTBLD~1.T-W\\AppData\\Local\\Temp', 'COMMONPROGRAMFILES(X86)': 'C:\\Program Files (x86)\\Common Files', 'RUNLOGFILE': 'C:\\slave\\\\runslave.log', 'PROCESSOR_ARCHITECTURE': 'x86', 'ALLUSERSPROFILE': 'C:\\ProgramData', 'USERPROFILE': 'C:\\Users\\cltbld.T-W864-IX-138', 'LOCALAPPDATA': 'C:\\Users\\cltbld.T-W864-IX-138\\AppData\\Local', 'HOMEPATH': '\\Users\\cltbld.T-W864-IX-138', 'USERDOMAIN_ROAMINGPROFILE': 'T-W864-IX-138', 'MOZBUILDDIR': 'C:\\mozilla-build\\', 'PROGRAMW6432': 'C:\\Program Files', 'USERNAME': 'cltbld', 'LOGONSERVER': '\\\\T-W864-IX-138', 'MOZ_NO_REMOTE': '1', 'COMSPEC': 'C:\\windows\\system32\\cmd.exe', 'PROGRAMDATA': 'C:\\ProgramData', 'PROPERTIES_FILE': 'C:\\slave\\test/buildprops.json', 'PATH': 'C:\\Program Files (x86)\\NVIDIA Corporation\\PhysX\\Common;C:\\windows\\system32;C:\\windows;C:\\windows\\System32\\Wbem;C:\\windows\\System32\\WindowsPowerShell\\v1.0\\;C:\\mozilla-build\\python27;C:\\mozilla-build\\python27\\Scripts;C:\\mozilla-build\\msys\\bin;C:\\mozilla-build\\vim\\vim72;C:\\mozilla-build\\wget;C:\\mozilla-build\\info-zip;C:\\CoreUtils\\bin;C:\\mozilla-build\\buildbotve\\scripts;C:\\mozilla-build\\hg', 'PROMPT': '$P$G', 'NO_FAIL_ON_TEST_ERRORS': '1', 'PATHEXT': '.COM;.EXE;.BAT;.CMD;.VBS;.VBE;.JS;.JSE;.WSF;.WSH;.MSC', 'FP_NO_HOST_CHECK': 'NO', 'DCLOCATION': 'SCL3', 'APPDATA': 'C:\\Users\\cltbld.T-W864-IX-138\\AppData\\Roaming', 'HOMEDRIVE': 'C:', 'SYSTEMDRIVE': 'C:', 'SLAVEDIR': 'C:\\slave\\', 'NUMBER_OF_PROCESSORS': '8', 'PWD': 'C:\\slave\\test', 'PROCESSOR_LEVEL': '6', 'KTS_HOME': 'C:\\Program Files\\KTS', 'PROCESSOR_ARCHITEW6432': 'AMD64', 'MOZ_CRASHREPORTER_NO_REPORT': '1', 'COMMONPROGRAMW6432': 'C:\\Program Files\\Common Files', 'OS': 'Windows_NT', 'PUBLIC': 'C:\\Users\\Public', 'WINDIR': 'C:\\windows'}}, attempt #1
23:26:03 INFO - Running command: ['C:\\slave\\test\\build\\venv\\Scripts\\pip', 'install', '--timeout', '120', '--no-index', '--find-links', 'http://pypi.pvt.build.mozilla.org/pub', '--find-links', 'http://pypi.pub.build.mozilla.org/pub', 'jsonschema==2.5.1'] in C:\slave\test\build
23:26:03 INFO - Copy/paste: C:\slave\test\build\venv\Scripts\pip install --timeout 120 --no-index --find-links http://pypi.pvt.build.mozilla.org/pub --find-links http://pypi.pub.build.mozilla.org/pub jsonschema==2.5.1
23:26:03 INFO - Using env: {'ALLUSERSPROFILE': 'C:\\ProgramData',
23:26:03 INFO - 'APPDATA': 'C:\\Users\\cltbld.T-W864-IX-138\\AppData\\Roaming',
23:26:03 INFO - 'COMMONPROGRAMFILES': 'C:\\Program Files (x86)\\Common Files',
23:26:03 INFO - 'COMMONPROGRAMFILES(X86)': 'C:\\Program Files (x86)\\Common Files',
23:26:03 INFO - 'COMMONPROGRAMW6432': 'C:\\Program Files\\Common Files',
23:26:03 INFO - 'COMPUTERNAME': 'T-W864-IX-138',
23:26:03 INFO - 'COMSPEC': 'C:\\windows\\system32\\cmd.exe',
23:26:03 INFO - 'DCLOCATION': 'SCL3',
23:26:03 INFO - 'DNSSUFFIX': 'wintest.releng.scl3.mozilla.com',
23:26:03 INFO - 'FP_NO_HOST_CHECK': 'NO',
23:26:03 INFO - 'HOMEDRIVE': 'C:',
23:26:03 INFO - 'HOMEPATH': '\\Users\\cltbld.T-W864-IX-138',
23:26:03 INFO - 'KTS_HOME': 'C:\\Program Files\\KTS',
23:26:03 INFO - 'KTS_VERSION': '1.19c',
23:26:03 INFO - 'LOCALAPPDATA': 'C:\\Users\\cltbld.T-W864-IX-138\\AppData\\Local',
23:26:03 INFO - 'LOGONSERVER': '\\\\T-W864-IX-138',
23:26:03 INFO - 'MONDIR': 'C:\\Monitor_config\\',
23:26:03 INFO - 'MOZBUILDDIR': 'C:\\mozilla-build\\',
23:26:03 INFO - 'MOZ_CRASHREPORTER_NO_REPORT': '1',
23:26:03 INFO - 'MOZ_HIDE_RESULTS_TABLE': '1',
23:26:03 INFO - 'MOZ_NO_REMOTE': '1',
23:26:03 INFO - 'NO_EM_RESTART': '1',
23:26:03 INFO - 'NO_FAIL_ON_TEST_ERRORS': '1',
23:26:03 INFO - 'NUMBER_OF_PROCESSORS': '8',
23:26:03 INFO - 'OS': 'Windows_NT',
23:26:03 INFO - 'OURDRIVE': 'C:',
23:26:03 INFO - 'PATH': 'C:\\Program Files (x86)\\NVIDIA Corporation\\PhysX\\Common;C:\\windows\\system32;C:\\windows;C:\\windows\\System32\\Wbem;C:\\windows\\System32\\WindowsPowerShell\\v1.0\\;C:\\mozilla-build\\python27;C:\\mozilla-build\\python27\\Scripts;C:\\mozilla-build\\msys\\bin;C:\\mozilla-build\\vim\\vim72;C:\\mozilla-build\\wget;C:\\mozilla-build\\info-zip;C:\\CoreUtils\\bin;C:\\mozilla-build\\buildbotve\\scripts;C:\\mozilla-build\\hg',
23:26:03 INFO - 'PATHEXT': '.COM;.EXE;.BAT;.CMD;.VBS;.VBE;.JS;.JSE;.WSF;.WSH;.MSC',
23:26:03 INFO - 'PROCESSOR_ARCHITECTURE': 'x86',
23:26:03 INFO - 'PROCESSOR_ARCHITEW6432': 'AMD64',
23:26:03 INFO - 'PROCESSOR_IDENTIFIER': 'Intel64 Family 6 Model 30 Stepping 5, GenuineIntel',
23:26:03 INFO - 'PROCESSOR_LEVEL': '6',
23:26:03 INFO - 'PROCESSOR_REVISION': '1e05',
23:26:03 INFO - 'PROGRAMDATA': 'C:\\ProgramData',
23:26:03 INFO - 'PROGRAMFILES': 'C:\\Program Files (x86)',
23:26:03 INFO - 'PROGRAMFILES(X86)': 'C:\\Program Files (x86)',
23:26:03 INFO - 'PROGRAMW6432': 'C:\\Program Files',
23:26:03 INFO - 'PROMPT': '$P$G',
23:26:03 INFO - 'PROPERTIES_FILE': 'C:\\slave\\test/buildprops.json',
23:26:03 INFO - 'PSMODULEPATH': 'C:\\windows\\system32\\WindowsPowerShell\\v1.0\\Modules\\',
23:26:03 INFO - 'PUBLIC': 'C:\\Users\\Public',
23:26:03 INFO - 'PWD': 'C:\\slave\\test',
23:26:03 INFO - 'RUNLOGFILE': 'C:\\slave\\\\runslave.log',
23:26:03 INFO - 'SLAVEDIR': 'C:\\slave\\',
23:26:03 INFO - 'SYSTEMDRIVE': 'C:',
23:26:03 INFO - 'SYSTEMROOT': 'C:\\windows',
23:26:03 INFO - 'TEMP': 'C:\\Users\\CLTBLD~1.T-W\\AppData\\Local\\Temp',
23:26:03 INFO - 'TEST1': 'testie',
23:26:03 INFO - 'TMP': 'C:\\Users\\CLTBLD~1.T-W\\AppData\\Local\\Temp',
23:26:03 INFO - 'USERDOMAIN': 'T-W864-IX-138',
23:26:03 INFO - 'USERDOMAIN_ROAMINGPROFILE': 'T-W864-IX-138',
23:26:03 INFO - 'USERNAME': 'cltbld',
23:26:03 INFO - 'USERPROFILE': 'C:\\Users\\cltbld.T-W864-IX-138',
23:26:03 INFO - 'WINDIR': 'C:\\windows',
23:26:03 INFO - 'XPCOM_DEBUG_BREAK': 'warn'}
23:26:04 INFO - Ignoring indexes: http://pypi.python.org/simple/
23:26:04 INFO - Downloading/unpacking jsonschema==2.5.1
23:26:06 INFO - Running setup.py egg_info for package jsonschema
23:26:06 INFO - zip_safe flag not set; analyzing archive contents...
23:26:06 INFO - install_dir .
23:26:06 INFO - Installed c:\slave\test\build\venv\build\jsonschema\vcversioner-2.16.0.0-py2.7.egg
23:26:06 INFO - Installing collected packages: jsonschema
23:26:06 INFO - Running setup.py install for jsonschema
23:26:06 INFO - Installing jsonschema-script.py script to C:\slave\test\build\venv\Scripts
23:26:06 INFO - Installing jsonschema.exe script to C:\slave\test\build\venv\Scripts
23:26:06 INFO - Successfully installed jsonschema
23:26:06 INFO - Cleaning up...
23:26:06 INFO - Return code: 0
23:26:06 INFO - Installing functools32==3.2.3-2 into virtualenv C:\slave\test\build\venv
23:26:06 INFO - proxxy config: {'regions': ['.use1.', '.usw2.', '.scl3'], 'instances': ['proxxy1.srv.releng.use1.mozilla.com', 'proxxy1.srv.releng.usw2.mozilla.com', 'proxxy1.srv.releng.scl3.mozilla.com'], 'urls': [('http://ftp.mozilla.org', 'ftp.mozilla.org'), ('https://ftp.mozilla.org', 'ftp.mozilla.org'), ('https://ftp-ssl.mozilla.org', 'ftp.mozilla.org'), ('http://pypi.pvt.build.mozilla.org', 'pypi.pvt.build.mozilla.org'), ('http://pypi.pub.build.mozilla.org', 'pypi.pub.build.mozilla.org')]}
23:26:06 INFO - http://pypi.pvt.build.mozilla.org/pub matches http://pypi.pvt.build.mozilla.org
23:26:06 INFO - proxxy config: {'regions': ['.use1.', '.usw2.', '.scl3'], 'instances': ['proxxy1.srv.releng.use1.mozilla.com', 'proxxy1.srv.releng.usw2.mozilla.com', 'proxxy1.srv.releng.scl3.mozilla.com'], 'urls': [('http://ftp.mozilla.org', 'ftp.mozilla.org'), ('https://ftp.mozilla.org', 'ftp.mozilla.org'), ('https://ftp-ssl.mozilla.org', 'ftp.mozilla.org'), ('http://pypi.pvt.build.mozilla.org', 'pypi.pvt.build.mozilla.org'), ('http://pypi.pub.build.mozilla.org', 'pypi.pub.build.mozilla.org')]}
23:26:06 INFO - http://pypi.pub.build.mozilla.org/pub matches http://pypi.pub.build.mozilla.org
23:26:06 INFO - retry: Calling run_command with args: [['C:\\slave\\test\\build\\venv\\Scripts\\pip', 'install', '--timeout', '120', '--no-index', '--find-links', 'http://pypi.pvt.build.mozilla.org/pub', '--find-links', 'http://pypi.pub.build.mozilla.org/pub', 'functools32==3.2.3-2']], kwargs: {'error_level': 'warning', 'error_list': [{'substr': 'not found or a compiler error:', 'level': 'warning'}, {'regex': <_sre.SRE_Pattern object at 0x02574250>, 'level': 'error'}, {'regex': <_sre.SRE_Pattern object at 0x02589188>, 'level': 'warning'}, {'regex': <_sre.SRE_Pattern object at 0x025B0AC0>, 'level': 'debug'}, {'substr': 'command not found', 'level': 'error'}, {'regex': <_sre.SRE_Pattern object at 0x006F8DE8>, 'level': 'warning'}, {'substr': 'Traceback (most recent call last)', 'level': 'error'}, {'substr': 'SyntaxError: ', 'level': 'error'}, {'substr': 'TypeError: ', 'level': 'error'}, {'substr': 'NameError: ', 'level': 'error'}, {'substr': 'ZeroDivisionError: ', 'level': 'error'}, {'regex': <_sre.SRE_Pattern object at 0x024FF230>, 'level': 'critical'}, {'regex': <_sre.SRE_Pattern object at 0x0257D520>, 'level': 'critical'}], 'cwd': 'C:\\slave\\test\\build', 'env': {'TMP': 'C:\\Users\\CLTBLD~1.T-W\\AppData\\Local\\Temp', 'TEST1': 'testie', 'COMPUTERNAME': 'T-W864-IX-138', 'USERDOMAIN': 'T-W864-IX-138', 'KTS_VERSION': '1.19c', 'PSMODULEPATH': 'C:\\windows\\system32\\WindowsPowerShell\\v1.0\\Modules\\', 'COMMONPROGRAMFILES': 'C:\\Program Files (x86)\\Common Files', 'PROCESSOR_IDENTIFIER': 'Intel64 Family 6 Model 30 Stepping 5, GenuineIntel', 'PROGRAMFILES': 'C:\\Program Files (x86)', 'PROCESSOR_REVISION': '1e05', 'DNSSUFFIX': 'wintest.releng.scl3.mozilla.com', 'SYSTEMROOT': 'C:\\windows', 'NO_EM_RESTART': '1', 'PROGRAMFILES(X86)': 'C:\\Program Files (x86)', 'OURDRIVE': 'C:', 'MOZ_HIDE_RESULTS_TABLE': '1', 'XPCOM_DEBUG_BREAK': 'warn', 'MONDIR': 'C:\\Monitor_config\\', 'TEMP': 'C:\\Users\\CLTBLD~1.T-W\\AppData\\Local\\Temp', 'COMMONPROGRAMFILES(X86)': 'C:\\Program Files (x86)\\Common Files', 'RUNLOGFILE': 'C:\\slave\\\\runslave.log', 'PROCESSOR_ARCHITECTURE': 'x86', 'ALLUSERSPROFILE': 'C:\\ProgramData', 'USERPROFILE': 'C:\\Users\\cltbld.T-W864-IX-138', 'LOCALAPPDATA': 'C:\\Users\\cltbld.T-W864-IX-138\\AppData\\Local', 'HOMEPATH': '\\Users\\cltbld.T-W864-IX-138', 'USERDOMAIN_ROAMINGPROFILE': 'T-W864-IX-138', 'MOZBUILDDIR': 'C:\\mozilla-build\\', 'PROGRAMW6432': 'C:\\Program Files', 'USERNAME': 'cltbld', 'LOGONSERVER': '\\\\T-W864-IX-138', 'MOZ_NO_REMOTE': '1', 'COMSPEC': 'C:\\windows\\system32\\cmd.exe', 'PROGRAMDATA': 'C:\\ProgramData', 'PROPERTIES_FILE': 'C:\\slave\\test/buildprops.json', 'PATH': 'C:\\Program Files (x86)\\NVIDIA Corporation\\PhysX\\Common;C:\\windows\\system32;C:\\windows;C:\\windows\\System32\\Wbem;C:\\windows\\System32\\WindowsPowerShell\\v1.0\\;C:\\mozilla-build\\python27;C:\\mozilla-build\\python27\\Scripts;C:\\mozilla-build\\msys\\bin;C:\\mozilla-build\\vim\\vim72;C:\\mozilla-build\\wget;C:\\mozilla-build\\info-zip;C:\\CoreUtils\\bin;C:\\mozilla-build\\buildbotve\\scripts;C:\\mozilla-build\\hg', 'PROMPT': '$P$G', 'NO_FAIL_ON_TEST_ERRORS': '1', 'PATHEXT': '.COM;.EXE;.BAT;.CMD;.VBS;.VBE;.JS;.JSE;.WSF;.WSH;.MSC', 'FP_NO_HOST_CHECK': 'NO', 'DCLOCATION': 'SCL3', 'APPDATA': 'C:\\Users\\cltbld.T-W864-IX-138\\AppData\\Roaming', 'HOMEDRIVE': 'C:', 'SYSTEMDRIVE': 'C:', 'SLAVEDIR': 'C:\\slave\\', 'NUMBER_OF_PROCESSORS': '8', 'PWD': 'C:\\slave\\test', 'PROCESSOR_LEVEL': '6', 'KTS_HOME': 'C:\\Program Files\\KTS', 'PROCESSOR_ARCHITEW6432': 'AMD64', 'MOZ_CRASHREPORTER_NO_REPORT': '1', 'COMMONPROGRAMW6432': 'C:\\Program Files\\Common Files', 'OS': 'Windows_NT', 'PUBLIC': 'C:\\Users\\Public', 'WINDIR': 'C:\\windows'}}, attempt #1
23:26:06 INFO - Running command: ['C:\\slave\\test\\build\\venv\\Scripts\\pip', 'install', '--timeout', '120', '--no-index', '--find-links', 'http://pypi.pvt.build.mozilla.org/pub', '--find-links', 'http://pypi.pub.build.mozilla.org/pub', 'functools32==3.2.3-2'] in C:\slave\test\build
23:26:06 INFO - Copy/paste: C:\slave\test\build\venv\Scripts\pip install --timeout 120 --no-index --find-links http://pypi.pvt.build.mozilla.org/pub --find-links http://pypi.pub.build.mozilla.org/pub functools32==3.2.3-2
23:26:06 INFO - Using env: {'ALLUSERSPROFILE': 'C:\\ProgramData',
23:26:06 INFO - 'APPDATA': 'C:\\Users\\cltbld.T-W864-IX-138\\AppData\\Roaming',
23:26:06 INFO - 'COMMONPROGRAMFILES': 'C:\\Program Files (x86)\\Common Files',
23:26:06 INFO - 'COMMONPROGRAMFILES(X86)': 'C:\\Program Files (x86)\\Common Files',
23:26:06 INFO - 'COMMONPROGRAMW6432': 'C:\\Program Files\\Common Files',
23:26:06 INFO - 'COMPUTERNAME': 'T-W864-IX-138',
23:26:06 INFO - 'COMSPEC': 'C:\\windows\\system32\\cmd.exe',
23:26:06 INFO - 'DCLOCATION': 'SCL3',
23:26:06 INFO - 'DNSSUFFIX': 'wintest.releng.scl3.mozilla.com',
23:26:06 INFO - 'FP_NO_HOST_CHECK': 'NO',
23:26:06 INFO - 'HOMEDRIVE': 'C:',
23:26:06 INFO - 'HOMEPATH': '\\Users\\cltbld.T-W864-IX-138',
23:26:06 INFO - 'KTS_HOME': 'C:\\Program Files\\KTS',
23:26:06 INFO - 'KTS_VERSION': '1.19c',
23:26:06 INFO - 'LOCALAPPDATA': 'C:\\Users\\cltbld.T-W864-IX-138\\AppData\\Local',
23:26:06 INFO - 'LOGONSERVER': '\\\\T-W864-IX-138',
23:26:06 INFO - 'MONDIR': 'C:\\Monitor_config\\',
23:26:06 INFO - 'MOZBUILDDIR': 'C:\\mozilla-build\\',
23:26:06 INFO - 'MOZ_CRASHREPORTER_NO_REPORT': '1',
23:26:06 INFO - 'MOZ_HIDE_RESULTS_TABLE': '1',
23:26:06 INFO - 'MOZ_NO_REMOTE': '1',
23:26:06 INFO - 'NO_EM_RESTART': '1',
23:26:06 INFO - 'NO_FAIL_ON_TEST_ERRORS': '1',
23:26:06 INFO - 'NUMBER_OF_PROCESSORS': '8',
23:26:06 INFO - 'OS': 'Windows_NT',
23:26:06 INFO - 'OURDRIVE': 'C:',
23:26:06 INFO - 'PATH': 'C:\\Program Files (x86)\\NVIDIA Corporation\\PhysX\\Common;C:\\windows\\system32;C:\\windows;C:\\windows\\System32\\Wbem;C:\\windows\\System32\\WindowsPowerShell\\v1.0\\;C:\\mozilla-build\\python27;C:\\mozilla-build\\python27\\Scripts;C:\\mozilla-build\\msys\\bin;C:\\mozilla-build\\vim\\vim72;C:\\mozilla-build\\wget;C:\\mozilla-build\\info-zip;C:\\CoreUtils\\bin;C:\\mozilla-build\\buildbotve\\scripts;C:\\mozilla-build\\hg',
23:26:06 INFO - 'PATHEXT': '.COM;.EXE;.BAT;.CMD;.VBS;.VBE;.JS;.JSE;.WSF;.WSH;.MSC',
23:26:06 INFO - 'PROCESSOR_ARCHITECTURE': 'x86',
23:26:06 INFO - 'PROCESSOR_ARCHITEW6432': 'AMD64',
23:26:06 INFO - 'PROCESSOR_IDENTIFIER': 'Intel64 Family 6 Model 30 Stepping 5, GenuineIntel',
23:26:06 INFO - 'PROCESSOR_LEVEL': '6',
23:26:06 INFO - 'PROCESSOR_REVISION': '1e05',
23:26:06 INFO - 'PROGRAMDATA': 'C:\\ProgramData',
23:26:06 INFO - 'PROGRAMFILES': 'C:\\Program Files (x86)',
23:26:06 INFO - 'PROGRAMFILES(X86)': 'C:\\Program Files (x86)',
23:26:06 INFO - 'PROGRAMW6432': 'C:\\Program Files',
23:26:06 INFO - 'PROMPT': '$P$G',
23:26:06 INFO - 'PROPERTIES_FILE': 'C:\\slave\\test/buildprops.json',
23:26:06 INFO - 'PSMODULEPATH': 'C:\\windows\\system32\\WindowsPowerShell\\v1.0\\Modules\\',
23:26:06 INFO - 'PUBLIC': 'C:\\Users\\Public',
23:26:06 INFO - 'PWD': 'C:\\slave\\test',
23:26:06 INFO - 'RUNLOGFILE': 'C:\\slave\\\\runslave.log',
23:26:06 INFO - 'SLAVEDIR': 'C:\\slave\\',
23:26:06 INFO - 'SYSTEMDRIVE': 'C:',
23:26:06 INFO - 'SYSTEMROOT': 'C:\\windows',
23:26:06 INFO - 'TEMP': 'C:\\Users\\CLTBLD~1.T-W\\AppData\\Local\\Temp',
23:26:06 INFO - 'TEST1': 'testie',
23:26:06 INFO - 'TMP': 'C:\\Users\\CLTBLD~1.T-W\\AppData\\Local\\Temp',
23:26:06 INFO - 'USERDOMAIN': 'T-W864-IX-138',
23:26:06 INFO - 'USERDOMAIN_ROAMINGPROFILE': 'T-W864-IX-138',
23:26:06 INFO - 'USERNAME': 'cltbld',
23:26:06 INFO - 'USERPROFILE': 'C:\\Users\\cltbld.T-W864-IX-138',
23:26:06 INFO - 'WINDIR': 'C:\\windows',
23:26:06 INFO - 'XPCOM_DEBUG_BREAK': 'warn'}
23:26:07 INFO - Ignoring indexes: http://pypi.python.org/simple/
23:26:07 INFO - Downloading/unpacking functools32==3.2.3-2
23:26:07 INFO - Downloading functools32-3.2.3-2.tar.gz
23:26:07 INFO - Running setup.py egg_info for package functools32
23:26:07 INFO - warning: no files found matching '*.txt'
23:26:07 INFO - no previously-included directories found matching 'build'
23:26:07 INFO - no previously-included directories found matching 'dist'
23:26:07 INFO - no previously-included directories found matching '.git*'
23:26:07 INFO - Installing collected packages: functools32
23:26:07 INFO - Running setup.py install for functools32
23:26:07 INFO - warning: no files found matching '*.txt'
23:26:07 INFO - no previously-included directories found matching 'build'
23:26:07 INFO - no previously-included directories found matching 'dist'
23:26:07 INFO - no previously-included directories found matching '.git*'
23:26:07 INFO - Successfully installed functools32
23:26:07 INFO - Cleaning up...
23:26:07 INFO - Return code: 0
23:26:07 INFO - Installing blobuploader==1.2.4 into virtualenv C:\slave\test\build\venv
23:26:07 INFO - proxxy config: {'regions': ['.use1.', '.usw2.', '.scl3'], 'instances': ['proxxy1.srv.releng.use1.mozilla.com', 'proxxy1.srv.releng.usw2.mozilla.com', 'proxxy1.srv.releng.scl3.mozilla.com'], 'urls': [('http://ftp.mozilla.org', 'ftp.mozilla.org'), ('https://ftp.mozilla.org', 'ftp.mozilla.org'), ('https://ftp-ssl.mozilla.org', 'ftp.mozilla.org'), ('http://pypi.pvt.build.mozilla.org', 'pypi.pvt.build.mozilla.org'), ('http://pypi.pub.build.mozilla.org', 'pypi.pub.build.mozilla.org')]}
23:26:07 INFO - http://pypi.pvt.build.mozilla.org/pub matches http://pypi.pvt.build.mozilla.org
23:26:07 INFO - proxxy config: {'regions': ['.use1.', '.usw2.', '.scl3'], 'instances': ['proxxy1.srv.releng.use1.mozilla.com', 'proxxy1.srv.releng.usw2.mozilla.com', 'proxxy1.srv.releng.scl3.mozilla.com'], 'urls': [('http://ftp.mozilla.org', 'ftp.mozilla.org'), ('https://ftp.mozilla.org', 'ftp.mozilla.org'), ('https://ftp-ssl.mozilla.org', 'ftp.mozilla.org'), ('http://pypi.pvt.build.mozilla.org', 'pypi.pvt.build.mozilla.org'), ('http://pypi.pub.build.mozilla.org', 'pypi.pub.build.mozilla.org')]}
23:26:07 INFO - http://pypi.pub.build.mozilla.org/pub matches http://pypi.pub.build.mozilla.org
23:26:07 INFO - retry: Calling run_command with args: [['C:\\slave\\test\\build\\venv\\Scripts\\pip', 'install', '--timeout', '120', '--no-index', '--find-links', 'http://pypi.pvt.build.mozilla.org/pub', '--find-links', 'http://pypi.pub.build.mozilla.org/pub', 'blobuploader==1.2.4']], kwargs: {'error_level': 'warning', 'error_list': [{'substr': 'not found or a compiler error:', 'level': 'warning'}, {'regex': <_sre.SRE_Pattern object at 0x02574250>, 'level': 'error'}, {'regex': <_sre.SRE_Pattern object at 0x02589188>, 'level': 'warning'}, {'regex': <_sre.SRE_Pattern object at 0x025B0AC0>, 'level': 'debug'}, {'substr': 'command not found', 'level': 'error'}, {'regex': <_sre.SRE_Pattern object at 0x006F8DE8>, 'level': 'warning'}, {'substr': 'Traceback (most recent call last)', 'level': 'error'}, {'substr': 'SyntaxError: ', 'level': 'error'}, {'substr': 'TypeError: ', 'level': 'error'}, {'substr': 'NameError: ', 'level': 'error'}, {'substr': 'ZeroDivisionError: ', 'level': 'error'}, {'regex': <_sre.SRE_Pattern object at 0x024FF230>, 'level': 'critical'}, {'regex': <_sre.SRE_Pattern object at 0x0257D520>, 'level': 'critical'}], 'cwd': 'C:\\slave\\test\\build', 'env': {'TMP': 'C:\\Users\\CLTBLD~1.T-W\\AppData\\Local\\Temp', 'TEST1': 'testie', 'COMPUTERNAME': 'T-W864-IX-138', 'USERDOMAIN': 'T-W864-IX-138', 'KTS_VERSION': '1.19c', 'PSMODULEPATH': 'C:\\windows\\system32\\WindowsPowerShell\\v1.0\\Modules\\', 'COMMONPROGRAMFILES': 'C:\\Program Files (x86)\\Common Files', 'PROCESSOR_IDENTIFIER': 'Intel64 Family 6 Model 30 Stepping 5, GenuineIntel', 'PROGRAMFILES': 'C:\\Program Files (x86)', 'PROCESSOR_REVISION': '1e05', 'DNSSUFFIX': 'wintest.releng.scl3.mozilla.com', 'SYSTEMROOT': 'C:\\windows', 'NO_EM_RESTART': '1', 'PROGRAMFILES(X86)': 'C:\\Program Files (x86)', 'OURDRIVE': 'C:', 'MOZ_HIDE_RESULTS_TABLE': '1', 'XPCOM_DEBUG_BREAK': 'warn', 'MONDIR': 'C:\\Monitor_config\\', 'TEMP': 'C:\\Users\\CLTBLD~1.T-W\\AppData\\Local\\Temp', 'COMMONPROGRAMFILES(X86)': 'C:\\Program Files (x86)\\Common Files', 'RUNLOGFILE': 'C:\\slave\\\\runslave.log', 'PROCESSOR_ARCHITECTURE': 'x86', 'ALLUSERSPROFILE': 'C:\\ProgramData', 'USERPROFILE': 'C:\\Users\\cltbld.T-W864-IX-138', 'LOCALAPPDATA': 'C:\\Users\\cltbld.T-W864-IX-138\\AppData\\Local', 'HOMEPATH': '\\Users\\cltbld.T-W864-IX-138', 'USERDOMAIN_ROAMINGPROFILE': 'T-W864-IX-138', 'MOZBUILDDIR': 'C:\\mozilla-build\\', 'PROGRAMW6432': 'C:\\Program Files', 'USERNAME': 'cltbld', 'LOGONSERVER': '\\\\T-W864-IX-138', 'MOZ_NO_REMOTE': '1', 'COMSPEC': 'C:\\windows\\system32\\cmd.exe', 'PROGRAMDATA': 'C:\\ProgramData', 'PROPERTIES_FILE': 'C:\\slave\\test/buildprops.json', 'PATH': 'C:\\Program Files (x86)\\NVIDIA Corporation\\PhysX\\Common;C:\\windows\\system32;C:\\windows;C:\\windows\\System32\\Wbem;C:\\windows\\System32\\WindowsPowerShell\\v1.0\\;C:\\mozilla-build\\python27;C:\\mozilla-build\\python27\\Scripts;C:\\mozilla-build\\msys\\bin;C:\\mozilla-build\\vim\\vim72;C:\\mozilla-build\\wget;C:\\mozilla-build\\info-zip;C:\\CoreUtils\\bin;C:\\mozilla-build\\buildbotve\\scripts;C:\\mozilla-build\\hg', 'PROMPT': '$P$G', 'NO_FAIL_ON_TEST_ERRORS': '1', 'PATHEXT': '.COM;.EXE;.BAT;.CMD;.VBS;.VBE;.JS;.JSE;.WSF;.WSH;.MSC', 'FP_NO_HOST_CHECK': 'NO', 'DCLOCATION': 'SCL3', 'APPDATA': 'C:\\Users\\cltbld.T-W864-IX-138\\AppData\\Roaming', 'HOMEDRIVE': 'C:', 'SYSTEMDRIVE': 'C:', 'SLAVEDIR': 'C:\\slave\\', 'NUMBER_OF_PROCESSORS': '8', 'PWD': 'C:\\slave\\test', 'PROCESSOR_LEVEL': '6', 'KTS_HOME': 'C:\\Program Files\\KTS', 'PROCESSOR_ARCHITEW6432': 'AMD64', 'MOZ_CRASHREPORTER_NO_REPORT': '1', 'COMMONPROGRAMW6432': 'C:\\Program Files\\Common Files', 'OS': 'Windows_NT', 'PUBLIC': 'C:\\Users\\Public', 'WINDIR': 'C:\\windows'}}, attempt #1
23:26:07 INFO - Running command: ['C:\\slave\\test\\build\\venv\\Scripts\\pip', 'install', '--timeout', '120', '--no-index', '--find-links', 'http://pypi.pvt.build.mozilla.org/pub', '--find-links', 'http://pypi.pub.build.mozilla.org/pub', 'blobuploader==1.2.4'] in C:\slave\test\build
23:26:07 INFO - Copy/paste: C:\slave\test\build\venv\Scripts\pip install --timeout 120 --no-index --find-links http://pypi.pvt.build.mozilla.org/pub --find-links http://pypi.pub.build.mozilla.org/pub blobuploader==1.2.4
23:26:07 INFO - Using env: {'ALLUSERSPROFILE': 'C:\\ProgramData',
23:26:07 INFO - 'APPDATA': 'C:\\Users\\cltbld.T-W864-IX-138\\AppData\\Roaming',
23:26:07 INFO - 'COMMONPROGRAMFILES': 'C:\\Program Files (x86)\\Common Files',
23:26:07 INFO - 'COMMONPROGRAMFILES(X86)': 'C:\\Program Files (x86)\\Common Files',
23:26:07 INFO - 'COMMONPROGRAMW6432': 'C:\\Program Files\\Common Files',
23:26:07 INFO - 'COMPUTERNAME': 'T-W864-IX-138',
23:26:07 INFO - 'COMSPEC': 'C:\\windows\\system32\\cmd.exe',
23:26:07 INFO - 'DCLOCATION': 'SCL3',
23:26:07 INFO - 'DNSSUFFIX': 'wintest.releng.scl3.mozilla.com',
23:26:07 INFO - 'FP_NO_HOST_CHECK': 'NO',
23:26:07 INFO - 'HOMEDRIVE': 'C:',
23:26:07 INFO - 'HOMEPATH': '\\Users\\cltbld.T-W864-IX-138',
23:26:07 INFO - 'KTS_HOME': 'C:\\Program Files\\KTS',
23:26:07 INFO - 'KTS_VERSION': '1.19c',
23:26:07 INFO - 'LOCALAPPDATA': 'C:\\Users\\cltbld.T-W864-IX-138\\AppData\\Local',
23:26:07 INFO - 'LOGONSERVER': '\\\\T-W864-IX-138',
23:26:07 INFO - 'MONDIR': 'C:\\Monitor_config\\',
23:26:07 INFO - 'MOZBUILDDIR': 'C:\\mozilla-build\\',
23:26:07 INFO - 'MOZ_CRASHREPORTER_NO_REPORT': '1',
23:26:07 INFO - 'MOZ_HIDE_RESULTS_TABLE': '1',
23:26:07 INFO - 'MOZ_NO_REMOTE': '1',
23:26:07 INFO - 'NO_EM_RESTART': '1',
23:26:07 INFO - 'NO_FAIL_ON_TEST_ERRORS': '1',
23:26:07 INFO - 'NUMBER_OF_PROCESSORS': '8',
23:26:07 INFO - 'OS': 'Windows_NT',
23:26:07 INFO - 'OURDRIVE': 'C:',
23:26:07 INFO - 'PATH': 'C:\\Program Files (x86)\\NVIDIA Corporation\\PhysX\\Common;C:\\windows\\system32;C:\\windows;C:\\windows\\System32\\Wbem;C:\\windows\\System32\\WindowsPowerShell\\v1.0\\;C:\\mozilla-build\\python27;C:\\mozilla-build\\python27\\Scripts;C:\\mozilla-build\\msys\\bin;C:\\mozilla-build\\vim\\vim72;C:\\mozilla-build\\wget;C:\\mozilla-build\\info-zip;C:\\CoreUtils\\bin;C:\\mozilla-build\\buildbotve\\scripts;C:\\mozilla-build\\hg',
23:26:07 INFO - 'PATHEXT': '.COM;.EXE;.BAT;.CMD;.VBS;.VBE;.JS;.JSE;.WSF;.WSH;.MSC',
23:26:07 INFO - 'PROCESSOR_ARCHITECTURE': 'x86',
23:26:07 INFO - 'PROCESSOR_ARCHITEW6432': 'AMD64',
23:26:07 INFO - 'PROCESSOR_IDENTIFIER': 'Intel64 Family 6 Model 30 Stepping 5, GenuineIntel',
23:26:07 INFO - 'PROCESSOR_LEVEL': '6',
23:26:07 INFO - 'PROCESSOR_REVISION': '1e05',
23:26:07 INFO - 'PROGRAMDATA': 'C:\\ProgramData',
23:26:07 INFO - 'PROGRAMFILES': 'C:\\Program Files (x86)',
23:26:07 INFO - 'PROGRAMFILES(X86)': 'C:\\Program Files (x86)',
23:26:07 INFO - 'PROGRAMW6432': 'C:\\Program Files',
23:26:07 INFO - 'PROMPT': '$P$G',
23:26:07 INFO - 'PROPERTIES_FILE': 'C:\\slave\\test/buildprops.json',
23:26:07 INFO - 'PSMODULEPATH': 'C:\\windows\\system32\\WindowsPowerShell\\v1.0\\Modules\\',
23:26:07 INFO - 'PUBLIC': 'C:\\Users\\Public',
23:26:07 INFO - 'PWD': 'C:\\slave\\test',
23:26:07 INFO - 'RUNLOGFILE': 'C:\\slave\\\\runslave.log',
23:26:07 INFO - 'SLAVEDIR': 'C:\\slave\\',
23:26:07 INFO - 'SYSTEMDRIVE': 'C:',
23:26:07 INFO - 'SYSTEMROOT': 'C:\\windows',
23:26:07 INFO - 'TEMP': 'C:\\Users\\CLTBLD~1.T-W\\AppData\\Local\\Temp',
23:26:07 INFO - 'TEST1': 'testie',
23:26:07 INFO - 'TMP': 'C:\\Users\\CLTBLD~1.T-W\\AppData\\Local\\Temp',
23:26:07 INFO - 'USERDOMAIN': 'T-W864-IX-138',
23:26:07 INFO - 'USERDOMAIN_ROAMINGPROFILE': 'T-W864-IX-138',
23:26:07 INFO - 'USERNAME': 'cltbld',
23:26:07 INFO - 'USERPROFILE': 'C:\\Users\\cltbld.T-W864-IX-138',
23:26:07 INFO - 'WINDIR': 'C:\\windows',
23:26:07 INFO - 'XPCOM_DEBUG_BREAK': 'warn'}
23:26:08 INFO - Ignoring indexes: http://pypi.python.org/simple/
23:26:08 INFO - Downloading/unpacking blobuploader==1.2.4
23:26:08 INFO - Downloading blobuploader-1.2.4.tar.gz
23:26:08 INFO - Running setup.py egg_info for package blobuploader
23:26:08 INFO - Downloading/unpacking requests==1.2.3. (from blobuploader==1.2.4)
23:26:11 INFO - Running setup.py egg_info for package requests
23:26:11 INFO - Downloading/unpacking docopt==0.6.1 (from blobuploader==1.2.4)
23:26:11 INFO - Downloading docopt-0.6.1.tar.gz
23:26:11 INFO - Running setup.py egg_info for package docopt
23:26:11 INFO - Installing collected packages: blobuploader, docopt, requests
23:26:11 INFO - Running setup.py install for blobuploader
23:26:11 INFO - Running setup.py install for docopt
23:26:11 INFO - Running setup.py install for requests
23:26:11 INFO - Successfully installed blobuploader docopt requests
23:26:11 INFO - Cleaning up...
23:26:11 INFO - Return code: 0
23:26:11 INFO - Installing None into virtualenv C:\slave\test\build\venv
23:26:11 INFO - proxxy config: {'regions': ['.use1.', '.usw2.', '.scl3'], 'instances': ['proxxy1.srv.releng.use1.mozilla.com', 'proxxy1.srv.releng.usw2.mozilla.com', 'proxxy1.srv.releng.scl3.mozilla.com'], 'urls': [('http://ftp.mozilla.org', 'ftp.mozilla.org'), ('https://ftp.mozilla.org', 'ftp.mozilla.org'), ('https://ftp-ssl.mozilla.org', 'ftp.mozilla.org'), ('http://pypi.pvt.build.mozilla.org', 'pypi.pvt.build.mozilla.org'), ('http://pypi.pub.build.mozilla.org', 'pypi.pub.build.mozilla.org')]}
23:26:11 INFO - http://pypi.pvt.build.mozilla.org/pub matches http://pypi.pvt.build.mozilla.org
23:26:11 INFO - proxxy config: {'regions': ['.use1.', '.usw2.', '.scl3'], 'instances': ['proxxy1.srv.releng.use1.mozilla.com', 'proxxy1.srv.releng.usw2.mozilla.com', 'proxxy1.srv.releng.scl3.mozilla.com'], 'urls': [('http://ftp.mozilla.org', 'ftp.mozilla.org'), ('https://ftp.mozilla.org', 'ftp.mozilla.org'), ('https://ftp-ssl.mozilla.org', 'ftp.mozilla.org'), ('http://pypi.pvt.build.mozilla.org', 'pypi.pvt.build.mozilla.org'), ('http://pypi.pub.build.mozilla.org', 'pypi.pub.build.mozilla.org')]}
23:26:11 INFO - http://pypi.pub.build.mozilla.org/pub matches http://pypi.pub.build.mozilla.org
23:26:11 INFO - retry: Calling run_command with args: [['C:\\slave\\test\\build\\venv\\Scripts\\pip', 'install', '--no-deps', '--timeout', '120', '-r', 'C:\\slave\\test\\build\\tests\\config\\marionette_requirements.txt', '--no-index', '--find-links', 'http://pypi.pvt.build.mozilla.org/pub', '--find-links', 'http://pypi.pub.build.mozilla.org/pub']], kwargs: {'error_level': 'warning', 'error_list': [{'substr': 'not found or a compiler error:', 'level': 'warning'}, {'regex': <_sre.SRE_Pattern object at 0x02574250>, 'level': 'error'}, {'regex': <_sre.SRE_Pattern object at 0x02589188>, 'level': 'warning'}, {'regex': <_sre.SRE_Pattern object at 0x025B0AC0>, 'level': 'debug'}, {'substr': 'command not found', 'level': 'error'}, {'regex': <_sre.SRE_Pattern object at 0x006F8DE8>, 'level': 'warning'}, {'substr': 'Traceback (most recent call last)', 'level': 'error'}, {'substr': 'SyntaxError: ', 'level': 'error'}, {'substr': 'TypeError: ', 'level': 'error'}, {'substr': 'NameError: ', 'level': 'error'}, {'substr': 'ZeroDivisionError: ', 'level': 'error'}, {'regex': <_sre.SRE_Pattern object at 0x024FF230>, 'level': 'critical'}, {'regex': <_sre.SRE_Pattern object at 0x0257D520>, 'level': 'critical'}], 'cwd': 'C:\\slave\\test\\build\\tests\\config', 'env': {'TMP': 'C:\\Users\\CLTBLD~1.T-W\\AppData\\Local\\Temp', 'TEST1': 'testie', 'COMPUTERNAME': 'T-W864-IX-138', 'USERDOMAIN': 'T-W864-IX-138', 'KTS_VERSION': '1.19c', 'PSMODULEPATH': 'C:\\windows\\system32\\WindowsPowerShell\\v1.0\\Modules\\', 'COMMONPROGRAMFILES': 'C:\\Program Files (x86)\\Common Files', 'PROCESSOR_IDENTIFIER': 'Intel64 Family 6 Model 30 Stepping 5, GenuineIntel', 'PROGRAMFILES': 'C:\\Program Files (x86)', 'PROCESSOR_REVISION': '1e05', 'DNSSUFFIX': 'wintest.releng.scl3.mozilla.com', 'SYSTEMROOT': 'C:\\windows', 'NO_EM_RESTART': '1', 'PROGRAMFILES(X86)': 'C:\\Program Files (x86)', 'OURDRIVE': 'C:', 'MOZ_HIDE_RESULTS_TABLE': '1', 'XPCOM_DEBUG_BREAK': 'warn', 'MONDIR': 'C:\\Monitor_config\\', 'TEMP': 'C:\\Users\\CLTBLD~1.T-W\\AppData\\Local\\Temp', 'COMMONPROGRAMFILES(X86)': 'C:\\Program Files (x86)\\Common Files', 'RUNLOGFILE': 'C:\\slave\\\\runslave.log', 'PROCESSOR_ARCHITECTURE': 'x86', 'ALLUSERSPROFILE': 'C:\\ProgramData', 'USERPROFILE': 'C:\\Users\\cltbld.T-W864-IX-138', 'LOCALAPPDATA': 'C:\\Users\\cltbld.T-W864-IX-138\\AppData\\Local', 'HOMEPATH': '\\Users\\cltbld.T-W864-IX-138', 'USERDOMAIN_ROAMINGPROFILE': 'T-W864-IX-138', 'MOZBUILDDIR': 'C:\\mozilla-build\\', 'PROGRAMW6432': 'C:\\Program Files', 'USERNAME': 'cltbld', 'LOGONSERVER': '\\\\T-W864-IX-138', 'MOZ_NO_REMOTE': '1', 'COMSPEC': 'C:\\windows\\system32\\cmd.exe', 'PROGRAMDATA': 'C:\\ProgramData', 'PROPERTIES_FILE': 'C:\\slave\\test/buildprops.json', 'PATH': 'C:\\Program Files (x86)\\NVIDIA Corporation\\PhysX\\Common;C:\\windows\\system32;C:\\windows;C:\\windows\\System32\\Wbem;C:\\windows\\System32\\WindowsPowerShell\\v1.0\\;C:\\mozilla-build\\python27;C:\\mozilla-build\\python27\\Scripts;C:\\mozilla-build\\msys\\bin;C:\\mozilla-build\\vim\\vim72;C:\\mozilla-build\\wget;C:\\mozilla-build\\info-zip;C:\\CoreUtils\\bin;C:\\mozilla-build\\buildbotve\\scripts;C:\\mozilla-build\\hg', 'PROMPT': '$P$G', 'NO_FAIL_ON_TEST_ERRORS': '1', 'PATHEXT': '.COM;.EXE;.BAT;.CMD;.VBS;.VBE;.JS;.JSE;.WSF;.WSH;.MSC', 'FP_NO_HOST_CHECK': 'NO', 'DCLOCATION': 'SCL3', 'APPDATA': 'C:\\Users\\cltbld.T-W864-IX-138\\AppData\\Roaming', 'HOMEDRIVE': 'C:', 'SYSTEMDRIVE': 'C:', 'SLAVEDIR': 'C:\\slave\\', 'NUMBER_OF_PROCESSORS': '8', 'PWD': 'C:\\slave\\test', 'PROCESSOR_LEVEL': '6', 'KTS_HOME': 'C:\\Program Files\\KTS', 'PROCESSOR_ARCHITEW6432': 'AMD64', 'MOZ_CRASHREPORTER_NO_REPORT': '1', 'COMMONPROGRAMW6432': 'C:\\Program Files\\Common Files', 'OS': 'Windows_NT', 'PUBLIC': 'C:\\Users\\Public', 'WINDIR': 'C:\\windows'}}, attempt #1
23:26:11 INFO - Running command: ['C:\\slave\\test\\build\\venv\\Scripts\\pip', 'install', '--no-deps', '--timeout', '120', '-r', 'C:\\slave\\test\\build\\tests\\config\\marionette_requirements.txt', '--no-index', '--find-links', 'http://pypi.pvt.build.mozilla.org/pub', '--find-links', 'http://pypi.pub.build.mozilla.org/pub'] in C:\slave\test\build\tests\config
23:26:11 INFO - Copy/paste: C:\slave\test\build\venv\Scripts\pip install --no-deps --timeout 120 -r C:\slave\test\build\tests\config\marionette_requirements.txt --no-index --find-links http://pypi.pvt.build.mozilla.org/pub --find-links http://pypi.pub.build.mozilla.org/pub
23:26:11 INFO - Using env: {'ALLUSERSPROFILE': 'C:\\ProgramData',
23:26:11 INFO - 'APPDATA': 'C:\\Users\\cltbld.T-W864-IX-138\\AppData\\Roaming',
23:26:11 INFO - 'COMMONPROGRAMFILES': 'C:\\Program Files (x86)\\Common Files',
23:26:11 INFO - 'COMMONPROGRAMFILES(X86)': 'C:\\Program Files (x86)\\Common Files',
23:26:11 INFO - 'COMMONPROGRAMW6432': 'C:\\Program Files\\Common Files',
23:26:11 INFO - 'COMPUTERNAME': 'T-W864-IX-138',
23:26:11 INFO - 'COMSPEC': 'C:\\windows\\system32\\cmd.exe',
23:26:11 INFO - 'DCLOCATION': 'SCL3',
23:26:11 INFO - 'DNSSUFFIX': 'wintest.releng.scl3.mozilla.com',
23:26:11 INFO - 'FP_NO_HOST_CHECK': 'NO',
23:26:11 INFO - 'HOMEDRIVE': 'C:',
23:26:11 INFO - 'HOMEPATH': '\\Users\\cltbld.T-W864-IX-138',
23:26:11 INFO - 'KTS_HOME': 'C:\\Program Files\\KTS',
23:26:11 INFO - 'KTS_VERSION': '1.19c',
23:26:11 INFO - 'LOCALAPPDATA': 'C:\\Users\\cltbld.T-W864-IX-138\\AppData\\Local',
23:26:11 INFO - 'LOGONSERVER': '\\\\T-W864-IX-138',
23:26:11 INFO - 'MONDIR': 'C:\\Monitor_config\\',
23:26:11 INFO - 'MOZBUILDDIR': 'C:\\mozilla-build\\',
23:26:11 INFO - 'MOZ_CRASHREPORTER_NO_REPORT': '1',
23:26:11 INFO - 'MOZ_HIDE_RESULTS_TABLE': '1',
23:26:11 INFO - 'MOZ_NO_REMOTE': '1',
23:26:11 INFO - 'NO_EM_RESTART': '1',
23:26:11 INFO - 'NO_FAIL_ON_TEST_ERRORS': '1',
23:26:11 INFO - 'NUMBER_OF_PROCESSORS': '8',
23:26:11 INFO - 'OS': 'Windows_NT',
23:26:11 INFO - 'OURDRIVE': 'C:',
23:26:11 INFO - 'PATH': 'C:\\Program Files (x86)\\NVIDIA Corporation\\PhysX\\Common;C:\\windows\\system32;C:\\windows;C:\\windows\\System32\\Wbem;C:\\windows\\System32\\WindowsPowerShell\\v1.0\\;C:\\mozilla-build\\python27;C:\\mozilla-build\\python27\\Scripts;C:\\mozilla-build\\msys\\bin;C:\\mozilla-build\\vim\\vim72;C:\\mozilla-build\\wget;C:\\mozilla-build\\info-zip;C:\\CoreUtils\\bin;C:\\mozilla-build\\buildbotve\\scripts;C:\\mozilla-build\\hg',
23:26:11 INFO - 'PATHEXT': '.COM;.EXE;.BAT;.CMD;.VBS;.VBE;.JS;.JSE;.WSF;.WSH;.MSC',
23:26:11 INFO - 'PROCESSOR_ARCHITECTURE': 'x86',
23:26:11 INFO - 'PROCESSOR_ARCHITEW6432': 'AMD64',
23:26:11 INFO - 'PROCESSOR_IDENTIFIER': 'Intel64 Family 6 Model 30 Stepping 5, GenuineIntel',
23:26:11 INFO - 'PROCESSOR_LEVEL': '6',
23:26:11 INFO - 'PROCESSOR_REVISION': '1e05',
23:26:11 INFO - 'PROGRAMDATA': 'C:\\ProgramData',
23:26:11 INFO - 'PROGRAMFILES': 'C:\\Program Files (x86)',
23:26:11 INFO - 'PROGRAMFILES(X86)': 'C:\\Program Files (x86)',
23:26:11 INFO - 'PROGRAMW6432': 'C:\\Program Files',
23:26:11 INFO - 'PROMPT': '$P$G',
23:26:11 INFO - 'PROPERTIES_FILE': 'C:\\slave\\test/buildprops.json',
23:26:11 INFO - 'PSMODULEPATH': 'C:\\windows\\system32\\WindowsPowerShell\\v1.0\\Modules\\',
23:26:11 INFO - 'PUBLIC': 'C:\\Users\\Public',
23:26:11 INFO - 'PWD': 'C:\\slave\\test',
23:26:11 INFO - 'RUNLOGFILE': 'C:\\slave\\\\runslave.log',
23:26:11 INFO - 'SLAVEDIR': 'C:\\slave\\',
23:26:11 INFO - 'SYSTEMDRIVE': 'C:',
23:26:11 INFO - 'SYSTEMROOT': 'C:\\windows',
23:26:11 INFO - 'TEMP': 'C:\\Users\\CLTBLD~1.T-W\\AppData\\Local\\Temp',
23:26:11 INFO - 'TEST1': 'testie',
23:26:11 INFO - 'TMP': 'C:\\Users\\CLTBLD~1.T-W\\AppData\\Local\\Temp',
23:26:11 INFO - 'USERDOMAIN': 'T-W864-IX-138',
23:26:11 INFO - 'USERDOMAIN_ROAMINGPROFILE': 'T-W864-IX-138',
23:26:11 INFO - 'USERNAME': 'cltbld',
23:26:11 INFO - 'USERPROFILE': 'C:\\Users\\cltbld.T-W864-IX-138',
23:26:11 INFO - 'WINDIR': 'C:\\windows',
23:26:11 INFO - 'XPCOM_DEBUG_BREAK': 'warn'}
23:26:18 INFO - Ignoring indexes: http://pypi.python.org/simple/
23:26:18 INFO - Unpacking c:\slave\test\build\tests\mozbase\manifestparser
23:26:18 INFO - Running setup.py egg_info for package from file:///c%7C%5Cslave%5Ctest%5Cbuild%5Ctests%5Cmozbase%5Cmanifestparser
23:26:18 INFO - Unpacking c:\slave\test\build\tests\mozbase\mozcrash
23:26:18 INFO - Running setup.py egg_info for package from file:///c%7C%5Cslave%5Ctest%5Cbuild%5Ctests%5Cmozbase%5Cmozcrash
23:26:18 INFO - Unpacking c:\slave\test\build\tests\mozbase\mozdebug
23:26:18 INFO - Running setup.py egg_info for package from file:///c%7C%5Cslave%5Ctest%5Cbuild%5Ctests%5Cmozbase%5Cmozdebug
23:26:18 INFO - Unpacking c:\slave\test\build\tests\mozbase\mozdevice
23:26:18 INFO - Running setup.py egg_info for package from file:///c%7C%5Cslave%5Ctest%5Cbuild%5Ctests%5Cmozbase%5Cmozdevice
23:26:18 INFO - Unpacking c:\slave\test\build\tests\mozbase\mozfile
23:26:18 INFO - Running setup.py egg_info for package from file:///c%7C%5Cslave%5Ctest%5Cbuild%5Ctests%5Cmozbase%5Cmozfile
23:26:18 INFO - Unpacking c:\slave\test\build\tests\mozbase\mozhttpd
23:26:18 INFO - Running setup.py egg_info for package from file:///c%7C%5Cslave%5Ctest%5Cbuild%5Ctests%5Cmozbase%5Cmozhttpd
23:26:18 INFO - Unpacking c:\slave\test\build\tests\mozbase\mozinfo
23:26:18 INFO - Running setup.py egg_info for package from file:///c%7C%5Cslave%5Ctest%5Cbuild%5Ctests%5Cmozbase%5Cmozinfo
23:26:18 INFO - Unpacking c:\slave\test\build\tests\mozbase\mozinstall
23:26:18 INFO - Running setup.py egg_info for package from file:///c%7C%5Cslave%5Ctest%5Cbuild%5Ctests%5Cmozbase%5Cmozinstall
23:26:18 INFO - Unpacking c:\slave\test\build\tests\mozbase\mozleak
23:26:18 INFO - Running setup.py egg_info for package from file:///c%7C%5Cslave%5Ctest%5Cbuild%5Ctests%5Cmozbase%5Cmozleak
23:26:18 INFO - Unpacking c:\slave\test\build\tests\mozbase\mozlog
23:26:18 INFO - Running setup.py egg_info for package from file:///c%7C%5Cslave%5Ctest%5Cbuild%5Ctests%5Cmozbase%5Cmozlog
23:26:18 INFO - Unpacking c:\slave\test\build\tests\mozbase\moznetwork
23:26:18 INFO - Running setup.py egg_info for package from file:///c%7C%5Cslave%5Ctest%5Cbuild%5Ctests%5Cmozbase%5Cmoznetwork
23:26:18 INFO - Unpacking c:\slave\test\build\tests\mozbase\mozprocess
23:26:18 INFO - Running setup.py egg_info for package from file:///c%7C%5Cslave%5Ctest%5Cbuild%5Ctests%5Cmozbase%5Cmozprocess
23:26:18 INFO - Unpacking c:\slave\test\build\tests\mozbase\mozprofile
23:26:18 INFO - Running setup.py egg_info for package from file:///c%7C%5Cslave%5Ctest%5Cbuild%5Ctests%5Cmozbase%5Cmozprofile
23:26:18 INFO - Unpacking c:\slave\test\build\tests\mozbase\mozrunner
23:26:18 INFO - Running setup.py egg_info for package from file:///c%7C%5Cslave%5Ctest%5Cbuild%5Ctests%5Cmozbase%5Cmozrunner
23:26:18 INFO - Unpacking c:\slave\test\build\tests\mozbase\mozscreenshot
23:26:18 INFO - Running setup.py egg_info for package from file:///c%7C%5Cslave%5Ctest%5Cbuild%5Ctests%5Cmozbase%5Cmozscreenshot
23:26:18 INFO - Unpacking c:\slave\test\build\tests\mozbase\moztest
23:26:18 INFO - Running setup.py egg_info for package from file:///c%7C%5Cslave%5Ctest%5Cbuild%5Ctests%5Cmozbase%5Cmoztest
23:26:18 INFO - Unpacking c:\slave\test\build\tests\mozbase\mozversion
23:26:18 INFO - Running setup.py egg_info for package from file:///c%7C%5Cslave%5Ctest%5Cbuild%5Ctests%5Cmozbase%5Cmozversion
23:26:18 INFO - Unpacking c:\slave\test\build\tests\tools\wptserve
23:26:18 INFO - Running setup.py egg_info for package from file:///c%7C%5Cslave%5Ctest%5Cbuild%5Ctests%5Ctools%5Cwptserve
23:26:18 INFO - Unpacking c:\slave\test\build\tests\marionette\client
23:26:18 INFO - Running setup.py egg_info for package from file:///c%7C%5Cslave%5Ctest%5Cbuild%5Ctests%5Cmarionette%5Cclient
23:26:18 INFO - Unpacking c:\slave\test\build\tests\marionette\marionette\runner\mixins\browsermob-proxy-py
23:26:18 INFO - Running setup.py egg_info for package from file:///c%7C%5Cslave%5Ctest%5Cbuild%5Ctests%5Cmarionette%5Cmarionette%5Crunner%5Cmixins%5Cbrowsermob-proxy-py
23:26:18 INFO - Unpacking c:\slave\test\build\tests\marionette
23:26:18 INFO - Running setup.py egg_info for package from file:///c%7C%5Cslave%5Ctest%5Cbuild%5Ctests%5Cmarionette
23:26:18 INFO - warning: no files found matching '*.js' under directory 'marionette\touch'
23:26:18 INFO - Installing collected packages: browsermob-proxy, manifestparser, marionette-client, marionette-driver, mozcrash, mozdebug, mozdevice, mozfile, mozhttpd, mozinfo, mozInstall, mozleak, mozlog, moznetwork, mozprocess, mozprofile, mozrunner, mozscreenshot, moztest, mozversion, wptserve
23:26:18 INFO - Running setup.py install for browsermob-proxy
23:26:31 INFO - Running setup.py install for manifestparser
23:26:31 INFO - Installing manifestparser-script.py script to C:\slave\test\build\venv\Scripts
23:26:31 INFO - Installing manifestparser.exe script to C:\slave\test\build\venv\Scripts
23:26:31 INFO - Running setup.py install for marionette-client
23:26:31 INFO - warning: no files found matching '*.js' under directory 'marionette\touch'
23:26:31 INFO - Installing marionette-script.py script to C:\slave\test\build\venv\Scripts
23:26:31 INFO - Installing marionette.exe script to C:\slave\test\build\venv\Scripts
23:26:31 INFO - Running setup.py install for marionette-driver
23:26:31 INFO - Running setup.py install for mozcrash
23:26:31 INFO - Running setup.py install for mozdebug
23:26:31 INFO - Running setup.py install for mozdevice
23:26:31 INFO - Installing sutini-script.py script to C:\slave\test\build\venv\Scripts
23:26:31 INFO - Installing sutini.exe script to C:\slave\test\build\venv\Scripts
23:26:31 INFO - Installing dm-script.py script to C:\slave\test\build\venv\Scripts
23:26:31 INFO - Installing dm.exe script to C:\slave\test\build\venv\Scripts
23:26:31 INFO - Running setup.py install for mozfile
23:26:31 INFO - Running setup.py install for mozhttpd
23:26:31 INFO - Installing mozhttpd-script.py script to C:\slave\test\build\venv\Scripts
23:26:31 INFO - Installing mozhttpd.exe script to C:\slave\test\build\venv\Scripts
23:26:31 INFO - Running setup.py install for mozinfo
23:26:31 INFO - Installing mozinfo-script.py script to C:\slave\test\build\venv\Scripts
23:26:31 INFO - Installing mozinfo.exe script to C:\slave\test\build\venv\Scripts
23:26:31 INFO - Running setup.py install for mozInstall
23:26:31 INFO - Installing moz_remove_from_system-script.py script to C:\slave\test\build\venv\Scripts
23:26:31 INFO - Installing moz_remove_from_system.exe script to C:\slave\test\build\venv\Scripts
23:26:31 INFO - Installing mozuninstall-script.py script to C:\slave\test\build\venv\Scripts
23:26:31 INFO - Installing mozuninstall.exe script to C:\slave\test\build\venv\Scripts
23:26:31 INFO - Installing mozinstall-script.py script to C:\slave\test\build\venv\Scripts
23:26:31 INFO - Installing mozinstall.exe script to C:\slave\test\build\venv\Scripts
23:26:31 INFO - Installing moz_add_to_system-script.py script to C:\slave\test\build\venv\Scripts
23:26:31 INFO - Installing moz_add_to_system.exe script to C:\slave\test\build\venv\Scripts
23:26:31 INFO - Running setup.py install for mozleak
23:26:31 INFO - Running setup.py install for mozlog
23:26:31 INFO - Installing structlog-script.py script to C:\slave\test\build\venv\Scripts
23:26:31 INFO - Installing structlog.exe script to C:\slave\test\build\venv\Scripts
23:26:31 INFO - Running setup.py install for moznetwork
23:26:31 INFO - Installing moznetwork-script.py script to C:\slave\test\build\venv\Scripts
23:26:31 INFO - Installing moznetwork.exe script to C:\slave\test\build\venv\Scripts
23:26:31 INFO - Running setup.py install for mozprocess
23:26:31 INFO - Running setup.py install for mozprofile
23:26:31 INFO - Installing mozprofile-script.py script to C:\slave\test\build\venv\Scripts
23:26:31 INFO - Installing mozprofile.exe script to C:\slave\test\build\venv\Scripts
23:26:31 INFO - Installing diff-profiles-script.py script to C:\slave\test\build\venv\Scripts
23:26:31 INFO - Installing diff-profiles.exe script to C:\slave\test\build\venv\Scripts
23:26:31 INFO - Installing view-profile-script.py script to C:\slave\test\build\venv\Scripts
23:26:31 INFO - Installing view-profile.exe script to C:\slave\test\build\venv\Scripts
23:26:31 INFO - Running setup.py install for mozrunner
23:26:31 INFO - Installing mozrunner-script.py script to C:\slave\test\build\venv\Scripts
23:26:31 INFO - Installing mozrunner.exe script to C:\slave\test\build\venv\Scripts
23:26:31 INFO - Running setup.py install for mozscreenshot
23:26:31 INFO - Running setup.py install for moztest
23:26:31 INFO - Running setup.py install for mozversion
23:26:31 INFO - Installing mozversion-script.py script to C:\slave\test\build\venv\Scripts
23:26:31 INFO - Installing mozversion.exe script to C:\slave\test\build\venv\Scripts
23:26:31 INFO - Running setup.py install for wptserve
23:26:31 INFO - Successfully installed browsermob-proxy manifestparser marionette-client marionette-driver mozcrash mozdebug mozdevice mozfile mozhttpd mozinfo mozInstall mozleak mozlog moznetwork mozprocess mozprofile mozrunner mozscreenshot moztest mozversion wptserve
23:26:31 INFO - Cleaning up...
23:26:31 INFO - Return code: 0
23:26:31 INFO - Installing None into virtualenv C:\slave\test\build\venv
23:26:31 INFO - proxxy config: {'regions': ['.use1.', '.usw2.', '.scl3'], 'instances': ['proxxy1.srv.releng.use1.mozilla.com', 'proxxy1.srv.releng.usw2.mozilla.com', 'proxxy1.srv.releng.scl3.mozilla.com'], 'urls': [('http://ftp.mozilla.org', 'ftp.mozilla.org'), ('https://ftp.mozilla.org', 'ftp.mozilla.org'), ('https://ftp-ssl.mozilla.org', 'ftp.mozilla.org'), ('http://pypi.pvt.build.mozilla.org', 'pypi.pvt.build.mozilla.org'), ('http://pypi.pub.build.mozilla.org', 'pypi.pub.build.mozilla.org')]}
23:26:31 INFO - http://pypi.pvt.build.mozilla.org/pub matches http://pypi.pvt.build.mozilla.org
23:26:31 INFO - proxxy config: {'regions': ['.use1.', '.usw2.', '.scl3'], 'instances': ['proxxy1.srv.releng.use1.mozilla.com', 'proxxy1.srv.releng.usw2.mozilla.com', 'proxxy1.srv.releng.scl3.mozilla.com'], 'urls': [('http://ftp.mozilla.org', 'ftp.mozilla.org'), ('https://ftp.mozilla.org', 'ftp.mozilla.org'), ('https://ftp-ssl.mozilla.org', 'ftp.mozilla.org'), ('http://pypi.pvt.build.mozilla.org', 'pypi.pvt.build.mozilla.org'), ('http://pypi.pub.build.mozilla.org', 'pypi.pub.build.mozilla.org')]}
23:26:31 INFO - http://pypi.pub.build.mozilla.org/pub matches http://pypi.pub.build.mozilla.org
23:26:31 INFO - retry: Calling run_command with args: [['C:\\slave\\test\\build\\venv\\Scripts\\pip', 'install', '--timeout', '120', '-r', 'C:\\slave\\test\\build\\tests\\config\\marionette_requirements.txt', '--no-index', '--find-links', 'http://pypi.pvt.build.mozilla.org/pub', '--find-links', 'http://pypi.pub.build.mozilla.org/pub']], kwargs: {'error_level': 'warning', 'error_list': [{'substr': 'not found or a compiler error:', 'level': 'warning'}, {'regex': <_sre.SRE_Pattern object at 0x02574250>, 'level': 'error'}, {'regex': <_sre.SRE_Pattern object at 0x02589188>, 'level': 'warning'}, {'regex': <_sre.SRE_Pattern object at 0x025B0AC0>, 'level': 'debug'}, {'substr': 'command not found', 'level': 'error'}, {'regex': <_sre.SRE_Pattern object at 0x006F8DE8>, 'level': 'warning'}, {'substr': 'Traceback (most recent call last)', 'level': 'error'}, {'substr': 'SyntaxError: ', 'level': 'error'}, {'substr': 'TypeError: ', 'level': 'error'}, {'substr': 'NameError: ', 'level': 'error'}, {'substr': 'ZeroDivisionError: ', 'level': 'error'}, {'regex': <_sre.SRE_Pattern object at 0x024FF230>, 'level': 'critical'}, {'regex': <_sre.SRE_Pattern object at 0x0257D520>, 'level': 'critical'}], 'cwd': 'C:\\slave\\test\\build\\tests\\config', 'env': {'TMP': 'C:\\Users\\CLTBLD~1.T-W\\AppData\\Local\\Temp', 'TEST1': 'testie', 'COMPUTERNAME': 'T-W864-IX-138', 'USERDOMAIN': 'T-W864-IX-138', 'KTS_VERSION': '1.19c', 'PSMODULEPATH': 'C:\\windows\\system32\\WindowsPowerShell\\v1.0\\Modules\\', 'COMMONPROGRAMFILES': 'C:\\Program Files (x86)\\Common Files', 'PROCESSOR_IDENTIFIER': 'Intel64 Family 6 Model 30 Stepping 5, GenuineIntel', 'PROGRAMFILES': 'C:\\Program Files (x86)', 'PROCESSOR_REVISION': '1e05', 'DNSSUFFIX': 'wintest.releng.scl3.mozilla.com', 'SYSTEMROOT': 'C:\\windows', 'NO_EM_RESTART': '1', 'PROGRAMFILES(X86)': 'C:\\Program Files (x86)', 'OURDRIVE': 'C:', 'MOZ_HIDE_RESULTS_TABLE': '1', 'XPCOM_DEBUG_BREAK': 'warn', 'MONDIR': 'C:\\Monitor_config\\', 'TEMP': 'C:\\Users\\CLTBLD~1.T-W\\AppData\\Local\\Temp', 'COMMONPROGRAMFILES(X86)': 'C:\\Program Files (x86)\\Common Files', 'RUNLOGFILE': 'C:\\slave\\\\runslave.log', 'PROCESSOR_ARCHITECTURE': 'x86', 'ALLUSERSPROFILE': 'C:\\ProgramData', 'USERPROFILE': 'C:\\Users\\cltbld.T-W864-IX-138', 'LOCALAPPDATA': 'C:\\Users\\cltbld.T-W864-IX-138\\AppData\\Local', 'HOMEPATH': '\\Users\\cltbld.T-W864-IX-138', 'USERDOMAIN_ROAMINGPROFILE': 'T-W864-IX-138', 'MOZBUILDDIR': 'C:\\mozilla-build\\', 'PROGRAMW6432': 'C:\\Program Files', 'USERNAME': 'cltbld', 'LOGONSERVER': '\\\\T-W864-IX-138', 'MOZ_NO_REMOTE': '1', 'COMSPEC': 'C:\\windows\\system32\\cmd.exe', 'PROGRAMDATA': 'C:\\ProgramData', 'PROPERTIES_FILE': 'C:\\slave\\test/buildprops.json', 'PATH': 'C:\\Program Files (x86)\\NVIDIA Corporation\\PhysX\\Common;C:\\windows\\system32;C:\\windows;C:\\windows\\System32\\Wbem;C:\\windows\\System32\\WindowsPowerShell\\v1.0\\;C:\\mozilla-build\\python27;C:\\mozilla-build\\python27\\Scripts;C:\\mozilla-build\\msys\\bin;C:\\mozilla-build\\vim\\vim72;C:\\mozilla-build\\wget;C:\\mozilla-build\\info-zip;C:\\CoreUtils\\bin;C:\\mozilla-build\\buildbotve\\scripts;C:\\mozilla-build\\hg', 'PROMPT': '$P$G', 'NO_FAIL_ON_TEST_ERRORS': '1', 'PATHEXT': '.COM;.EXE;.BAT;.CMD;.VBS;.VBE;.JS;.JSE;.WSF;.WSH;.MSC', 'FP_NO_HOST_CHECK': 'NO', 'DCLOCATION': 'SCL3', 'APPDATA': 'C:\\Users\\cltbld.T-W864-IX-138\\AppData\\Roaming', 'HOMEDRIVE': 'C:', 'SYSTEMDRIVE': 'C:', 'SLAVEDIR': 'C:\\slave\\', 'NUMBER_OF_PROCESSORS': '8', 'PWD': 'C:\\slave\\test', 'PROCESSOR_LEVEL': '6', 'KTS_HOME': 'C:\\Program Files\\KTS', 'PROCESSOR_ARCHITEW6432': 'AMD64', 'MOZ_CRASHREPORTER_NO_REPORT': '1', 'COMMONPROGRAMW6432': 'C:\\Program Files\\Common Files', 'OS': 'Windows_NT', 'PUBLIC': 'C:\\Users\\Public', 'WINDIR': 'C:\\windows'}}, attempt #1
23:26:31 INFO - Running command: ['C:\\slave\\test\\build\\venv\\Scripts\\pip', 'install', '--timeout', '120', '-r', 'C:\\slave\\test\\build\\tests\\config\\marionette_requirements.txt', '--no-index', '--find-links', 'http://pypi.pvt.build.mozilla.org/pub', '--find-links', 'http://pypi.pub.build.mozilla.org/pub'] in C:\slave\test\build\tests\config
23:26:31 INFO - Copy/paste: C:\slave\test\build\venv\Scripts\pip install --timeout 120 -r C:\slave\test\build\tests\config\marionette_requirements.txt --no-index --find-links http://pypi.pvt.build.mozilla.org/pub --find-links http://pypi.pub.build.mozilla.org/pub
23:26:31 INFO - Using env: {'ALLUSERSPROFILE': 'C:\\ProgramData',
23:26:31 INFO - 'APPDATA': 'C:\\Users\\cltbld.T-W864-IX-138\\AppData\\Roaming',
23:26:31 INFO - 'COMMONPROGRAMFILES': 'C:\\Program Files (x86)\\Common Files',
23:26:31 INFO - 'COMMONPROGRAMFILES(X86)': 'C:\\Program Files (x86)\\Common Files',
23:26:31 INFO - 'COMMONPROGRAMW6432': 'C:\\Program Files\\Common Files',
23:26:31 INFO - 'COMPUTERNAME': 'T-W864-IX-138',
23:26:31 INFO - 'COMSPEC': 'C:\\windows\\system32\\cmd.exe',
23:26:31 INFO - 'DCLOCATION': 'SCL3',
23:26:31 INFO - 'DNSSUFFIX': 'wintest.releng.scl3.mozilla.com',
23:26:31 INFO - 'FP_NO_HOST_CHECK': 'NO',
23:26:31 INFO - 'HOMEDRIVE': 'C:',
23:26:31 INFO - 'HOMEPATH': '\\Users\\cltbld.T-W864-IX-138',
23:26:31 INFO - 'KTS_HOME': 'C:\\Program Files\\KTS',
23:26:31 INFO - 'KTS_VERSION': '1.19c',
23:26:31 INFO - 'LOCALAPPDATA': 'C:\\Users\\cltbld.T-W864-IX-138\\AppData\\Local',
23:26:31 INFO - 'LOGONSERVER': '\\\\T-W864-IX-138',
23:26:31 INFO - 'MONDIR': 'C:\\Monitor_config\\',
23:26:31 INFO - 'MOZBUILDDIR': 'C:\\mozilla-build\\',
23:26:31 INFO - 'MOZ_CRASHREPORTER_NO_REPORT': '1',
23:26:31 INFO - 'MOZ_HIDE_RESULTS_TABLE': '1',
23:26:31 INFO - 'MOZ_NO_REMOTE': '1',
23:26:31 INFO - 'NO_EM_RESTART': '1',
23:26:31 INFO - 'NO_FAIL_ON_TEST_ERRORS': '1',
23:26:31 INFO - 'NUMBER_OF_PROCESSORS': '8',
23:26:31 INFO - 'OS': 'Windows_NT',
23:26:31 INFO - 'OURDRIVE': 'C:',
23:26:31 INFO - 'PATH': 'C:\\Program Files (x86)\\NVIDIA Corporation\\PhysX\\Common;C:\\windows\\system32;C:\\windows;C:\\windows\\System32\\Wbem;C:\\windows\\System32\\WindowsPowerShell\\v1.0\\;C:\\mozilla-build\\python27;C:\\mozilla-build\\python27\\Scripts;C:\\mozilla-build\\msys\\bin;C:\\mozilla-build\\vim\\vim72;C:\\mozilla-build\\wget;C:\\mozilla-build\\info-zip;C:\\CoreUtils\\bin;C:\\mozilla-build\\buildbotve\\scripts;C:\\mozilla-build\\hg',
23:26:31 INFO - 'PATHEXT': '.COM;.EXE;.BAT;.CMD;.VBS;.VBE;.JS;.JSE;.WSF;.WSH;.MSC',
23:26:31 INFO - 'PROCESSOR_ARCHITECTURE': 'x86',
23:26:31 INFO - 'PROCESSOR_ARCHITEW6432': 'AMD64',
23:26:31 INFO - 'PROCESSOR_IDENTIFIER': 'Intel64 Family 6 Model 30 Stepping 5, GenuineIntel',
23:26:31 INFO - 'PROCESSOR_LEVEL': '6',
23:26:31 INFO - 'PROCESSOR_REVISION': '1e05',
23:26:31 INFO - 'PROGRAMDATA': 'C:\\ProgramData',
23:26:31 INFO - 'PROGRAMFILES': 'C:\\Program Files (x86)',
23:26:31 INFO - 'PROGRAMFILES(X86)': 'C:\\Program Files (x86)',
23:26:31 INFO - 'PROGRAMW6432': 'C:\\Program Files',
23:26:31 INFO - 'PROMPT': '$P$G',
23:26:31 INFO - 'PROPERTIES_FILE': 'C:\\slave\\test/buildprops.json',
23:26:31 INFO - 'PSMODULEPATH': 'C:\\windows\\system32\\WindowsPowerShell\\v1.0\\Modules\\',
23:26:31 INFO - 'PUBLIC': 'C:\\Users\\Public',
23:26:31 INFO - 'PWD': 'C:\\slave\\test',
23:26:31 INFO - 'RUNLOGFILE': 'C:\\slave\\\\runslave.log',
23:26:31 INFO - 'SLAVEDIR': 'C:\\slave\\',
23:26:31 INFO - 'SYSTEMDRIVE': 'C:',
23:26:31 INFO - 'SYSTEMROOT': 'C:\\windows',
23:26:31 INFO - 'TEMP': 'C:\\Users\\CLTBLD~1.T-W\\AppData\\Local\\Temp',
23:26:31 INFO - 'TEST1': 'testie',
23:26:31 INFO - 'TMP': 'C:\\Users\\CLTBLD~1.T-W\\AppData\\Local\\Temp',
23:26:31 INFO - 'USERDOMAIN': 'T-W864-IX-138',
23:26:31 INFO - 'USERDOMAIN_ROAMINGPROFILE': 'T-W864-IX-138',
23:26:31 INFO - 'USERNAME': 'cltbld',
23:26:31 INFO - 'USERPROFILE': 'C:\\Users\\cltbld.T-W864-IX-138',
23:26:31 INFO - 'WINDIR': 'C:\\windows',
23:26:31 INFO - 'XPCOM_DEBUG_BREAK': 'warn'}
23:26:34 INFO - Ignoring indexes: http://pypi.python.org/simple/
23:26:34 INFO - Unpacking c:\slave\test\build\tests\mozbase\manifestparser
23:26:34 INFO - Running setup.py egg_info for package from file:///c%7C%5Cslave%5Ctest%5Cbuild%5Ctests%5Cmozbase%5Cmanifestparser
23:26:34 INFO - Unpacking c:\slave\test\build\tests\mozbase\mozcrash
23:26:34 INFO - Running setup.py egg_info for package from file:///c%7C%5Cslave%5Ctest%5Cbuild%5Ctests%5Cmozbase%5Cmozcrash
23:26:34 INFO - Unpacking c:\slave\test\build\tests\mozbase\mozdebug
23:26:34 INFO - Running setup.py egg_info for package from file:///c%7C%5Cslave%5Ctest%5Cbuild%5Ctests%5Cmozbase%5Cmozdebug
23:26:34 INFO - Unpacking c:\slave\test\build\tests\mozbase\mozdevice
23:26:34 INFO - Running setup.py egg_info for package from file:///c%7C%5Cslave%5Ctest%5Cbuild%5Ctests%5Cmozbase%5Cmozdevice
23:26:34 INFO - Unpacking c:\slave\test\build\tests\mozbase\mozfile
23:26:34 INFO - Running setup.py egg_info for package from file:///c%7C%5Cslave%5Ctest%5Cbuild%5Ctests%5Cmozbase%5Cmozfile
23:26:34 INFO - Unpacking c:\slave\test\build\tests\mozbase\mozhttpd
23:26:34 INFO - Running setup.py egg_info for package from file:///c%7C%5Cslave%5Ctest%5Cbuild%5Ctests%5Cmozbase%5Cmozhttpd
23:26:34 INFO - Unpacking c:\slave\test\build\tests\mozbase\mozinfo
23:26:34 INFO - Running setup.py egg_info for package from file:///c%7C%5Cslave%5Ctest%5Cbuild%5Ctests%5Cmozbase%5Cmozinfo
23:26:34 INFO - Unpacking c:\slave\test\build\tests\mozbase\mozinstall
23:26:34 INFO - Running setup.py egg_info for package from file:///c%7C%5Cslave%5Ctest%5Cbuild%5Ctests%5Cmozbase%5Cmozinstall
23:26:34 INFO - Unpacking c:\slave\test\build\tests\mozbase\mozleak
23:26:34 INFO - Running setup.py egg_info for package from file:///c%7C%5Cslave%5Ctest%5Cbuild%5Ctests%5Cmozbase%5Cmozleak
23:26:34 INFO - Unpacking c:\slave\test\build\tests\mozbase\mozlog
23:26:34 INFO - Running setup.py egg_info for package from file:///c%7C%5Cslave%5Ctest%5Cbuild%5Ctests%5Cmozbase%5Cmozlog
23:26:34 INFO - Unpacking c:\slave\test\build\tests\mozbase\moznetwork
23:26:34 INFO - Running setup.py egg_info for package from file:///c%7C%5Cslave%5Ctest%5Cbuild%5Ctests%5Cmozbase%5Cmoznetwork
23:26:34 INFO - Unpacking c:\slave\test\build\tests\mozbase\mozprocess
23:26:34 INFO - Running setup.py egg_info for package from file:///c%7C%5Cslave%5Ctest%5Cbuild%5Ctests%5Cmozbase%5Cmozprocess
23:26:34 INFO - Unpacking c:\slave\test\build\tests\mozbase\mozprofile
23:26:34 INFO - Running setup.py egg_info for package from file:///c%7C%5Cslave%5Ctest%5Cbuild%5Ctests%5Cmozbase%5Cmozprofile
23:26:34 INFO - Unpacking c:\slave\test\build\tests\mozbase\mozrunner
23:26:34 INFO - Running setup.py egg_info for package from file:///c%7C%5Cslave%5Ctest%5Cbuild%5Ctests%5Cmozbase%5Cmozrunner
23:26:34 INFO - Unpacking c:\slave\test\build\tests\mozbase\mozscreenshot
23:26:34 INFO - Running setup.py egg_info for package from file:///c%7C%5Cslave%5Ctest%5Cbuild%5Ctests%5Cmozbase%5Cmozscreenshot
23:26:34 INFO - Unpacking c:\slave\test\build\tests\mozbase\moztest
23:26:34 INFO - Running setup.py egg_info for package from file:///c%7C%5Cslave%5Ctest%5Cbuild%5Ctests%5Cmozbase%5Cmoztest
23:26:34 INFO - Unpacking c:\slave\test\build\tests\mozbase\mozversion
23:26:34 INFO - Running setup.py egg_info for package from file:///c%7C%5Cslave%5Ctest%5Cbuild%5Ctests%5Cmozbase%5Cmozversion
23:26:34 INFO - Unpacking c:\slave\test\build\tests\tools\wptserve
23:26:34 INFO - Running setup.py egg_info for package from file:///c%7C%5Cslave%5Ctest%5Cbuild%5Ctests%5Ctools%5Cwptserve
23:26:34 INFO - Unpacking c:\slave\test\build\tests\marionette\client
23:26:34 INFO - Running setup.py egg_info for package from file:///c%7C%5Cslave%5Ctest%5Cbuild%5Ctests%5Cmarionette%5Cclient
23:26:34 INFO - Unpacking c:\slave\test\build\tests\marionette\marionette\runner\mixins\browsermob-proxy-py
23:26:34 INFO - Running setup.py egg_info for package from file:///c%7C%5Cslave%5Ctest%5Cbuild%5Ctests%5Cmarionette%5Cmarionette%5Crunner%5Cmixins%5Cbrowsermob-proxy-py
23:26:34 INFO - Unpacking c:\slave\test\build\tests\marionette
23:26:34 INFO - Running setup.py egg_info for package from file:///c%7C%5Cslave%5Ctest%5Cbuild%5Ctests%5Cmarionette
23:26:34 INFO - warning: no files found matching '*.js' under directory 'marionette\touch'
23:26:34 INFO - Requirement already satisfied (use --upgrade to upgrade): mozfile>=1.0 in c:\slave\test\build\venv\lib\site-packages (from mozcrash->-r C:\slave\test\build\tests\config\mozbase_requirements.txt (line 2))
23:26:44 INFO - Requirement already satisfied (use --upgrade to upgrade): mozlog>=3.0 in c:\slave\test\build\venv\lib\site-packages (from mozcrash->-r C:\slave\test\build\tests\config\mozbase_requirements.txt (line 2))
23:26:44 INFO - Requirement already satisfied (use --upgrade to upgrade): mozinfo in c:\slave\test\build\venv\lib\site-packages (from mozdebug->-r C:\slave\test\build\tests\config\mozbase_requirements.txt (line 3))
23:26:44 INFO - Requirement already satisfied (use --upgrade to upgrade): moznetwork>=0.24 in c:\slave\test\build\venv\lib\site-packages (from mozdevice->-r C:\slave\test\build\tests\config\mozbase_requirements.txt (line 4))
23:26:44 INFO - Requirement already satisfied (use --upgrade to upgrade): mozprocess>=0.19 in c:\slave\test\build\venv\lib\site-packages (from mozdevice->-r C:\slave\test\build\tests\config\mozbase_requirements.txt (line 4))
23:26:44 INFO - Downloading/unpacking blessings>=1.3 (from mozlog->-r C:\slave\test\build\tests\config\mozbase_requirements.txt (line 10))
23:26:44 INFO - Downloading blessings-1.6.tar.gz
23:26:44 INFO - Running setup.py egg_info for package blessings
23:26:44 INFO - Requirement already satisfied (use --upgrade to upgrade): requests>=1.1.0 in c:\slave\test\build\venv\lib\site-packages (from browsermob-proxy->-r C:\slave\test\build\tests\config\marionette_requirements.txt (line 4))
23:26:44 INFO - Installing collected packages: blessings, browsermob-proxy, manifestparser, marionette-client, marionette-driver, mozcrash, mozdebug, mozdevice, mozhttpd, mozInstall, mozleak, mozprofile, mozrunner, mozscreenshot, moztest, mozversion, wptserve
23:26:44 INFO - Running setup.py install for blessings
23:26:44 INFO - Running setup.py install for browsermob-proxy
23:26:44 INFO - Running setup.py install for manifestparser
23:26:44 INFO - Installing manifestparser-script.py script to C:\slave\test\build\venv\Scripts
23:26:44 INFO - Installing manifestparser.exe script to C:\slave\test\build\venv\Scripts
23:26:44 INFO - Running setup.py install for marionette-client
23:26:44 INFO - warning: no files found matching '*.js' under directory 'marionette\touch'
23:26:44 INFO - Installing marionette-script.py script to C:\slave\test\build\venv\Scripts
23:26:44 INFO - Installing marionette.exe script to C:\slave\test\build\venv\Scripts
23:26:44 INFO - Running setup.py install for marionette-driver
23:26:44 INFO - Running setup.py install for mozcrash
23:26:44 INFO - Running setup.py install for mozdebug
23:26:44 INFO - Running setup.py install for mozdevice
23:26:44 INFO - Installing sutini-script.py script to C:\slave\test\build\venv\Scripts
23:26:44 INFO - Installing sutini.exe script to C:\slave\test\build\venv\Scripts
23:26:44 INFO - Installing dm-script.py script to C:\slave\test\build\venv\Scripts
23:26:44 INFO - Installing dm.exe script to C:\slave\test\build\venv\Scripts
23:26:44 INFO - Running setup.py install for mozhttpd
23:26:44 INFO - Installing mozhttpd-script.py script to C:\slave\test\build\venv\Scripts
23:26:44 INFO - Installing mozhttpd.exe script to C:\slave\test\build\venv\Scripts
23:26:44 INFO - Running setup.py install for mozInstall
23:26:44 INFO - Installing moz_remove_from_system-script.py script to C:\slave\test\build\venv\Scripts
23:26:44 INFO - Installing moz_remove_from_system.exe script to C:\slave\test\build\venv\Scripts
23:26:44 INFO - Installing mozuninstall-script.py script to C:\slave\test\build\venv\Scripts
23:26:44 INFO - Installing mozuninstall.exe script to C:\slave\test\build\venv\Scripts
23:26:44 INFO - Installing mozinstall-script.py script to C:\slave\test\build\venv\Scripts
23:26:44 INFO - Installing mozinstall.exe script to C:\slave\test\build\venv\Scripts
23:26:44 INFO - Installing moz_add_to_system-script.py script to C:\slave\test\build\venv\Scripts
23:26:44 INFO - Installing moz_add_to_system.exe script to C:\slave\test\build\venv\Scripts
23:26:44 INFO - Running setup.py install for mozleak
23:26:44 INFO - Running setup.py install for mozprofile
23:26:44 INFO - Installing mozprofile-script.py script to C:\slave\test\build\venv\Scripts
23:26:44 INFO - Installing mozprofile.exe script to C:\slave\test\build\venv\Scripts
23:26:44 INFO - Installing diff-profiles-script.py script to C:\slave\test\build\venv\Scripts
23:26:44 INFO - Installing diff-profiles.exe script to C:\slave\test\build\venv\Scripts
23:26:44 INFO - Installing view-profile-script.py script to C:\slave\test\build\venv\Scripts
23:26:44 INFO - Installing view-profile.exe script to C:\slave\test\build\venv\Scripts
23:26:44 INFO - Running setup.py install for mozrunner
23:26:44 INFO - Installing mozrunner-script.py script to C:\slave\test\build\venv\Scripts
23:26:44 INFO - Installing mozrunner.exe script to C:\slave\test\build\venv\Scripts
23:26:46 INFO - Running setup.py install for mozscreenshot
23:26:46 INFO - Running setup.py install for moztest
23:26:46 INFO - Running setup.py install for mozversion
23:26:46 INFO - Installing mozversion-script.py script to C:\slave\test\build\venv\Scripts
23:26:46 INFO - Installing mozversion.exe script to C:\slave\test\build\venv\Scripts
23:26:46 INFO - Running setup.py install for wptserve
23:26:46 INFO - Successfully installed blessings browsermob-proxy manifestparser marionette-client marionette-driver mozcrash mozdebug mozdevice mozhttpd mozInstall mozleak mozprofile mozrunner mozscreenshot moztest mozversion wptserve
23:26:46 INFO - Cleaning up...
23:26:46 INFO - Return code: 0
23:26:46 INFO - Done creating virtualenv C:\slave\test\build\venv.
23:26:46 INFO - Getting output from command: ['C:\\slave\\test\\build\\venv\\Scripts\\pip', 'freeze']
23:26:46 INFO - Copy/paste: C:\slave\test\build\venv\Scripts\pip freeze
23:26:46 INFO - Reading from file tmpfile_stdout
23:26:46 INFO - Using _rmtree_windows ...
23:26:46 INFO - Using _rmtree_windows ...
23:26:46 INFO - Current package versions:
23:26:46 INFO - blessings == 1.6
23:26:46 INFO - blobuploader == 1.2.4
23:26:46 INFO - browsermob-proxy == 0.6.0
23:26:46 INFO - distribute == 0.6.14
23:26:46 INFO - docopt == 0.6.1
23:26:46 INFO - functools32 == 3.2.3-2
23:26:46 INFO - jsonschema == 2.5.1
23:26:46 INFO - manifestparser == 1.1
23:26:46 INFO - marionette-client == 3.2.0
23:26:46 INFO - marionette-driver == 2.1.0
23:26:46 INFO - mozInstall == 1.12
23:26:46 INFO - mozcrash == 0.17
23:26:46 INFO - mozdebug == 0.1
23:26:46 INFO - mozdevice == 0.48
23:26:46 INFO - mozfile == 1.2
23:26:46 INFO - mozhttpd == 0.7
23:26:46 INFO - mozinfo == 0.9
23:26:46 INFO - mozleak == 0.1
23:26:46 INFO - mozlog == 3.4
23:26:46 INFO - moznetwork == 0.27
23:26:46 INFO - mozprocess == 0.23
23:26:46 INFO - mozprofile == 0.28
23:26:46 INFO - mozrunner == 6.12
23:26:46 INFO - mozscreenshot == 0.1
23:26:46 INFO - mozsystemmonitor == 0.3
23:26:46 INFO - moztest == 0.7
23:26:46 INFO - mozversion == 1.4
23:26:46 INFO - requests == 1.2.3
23:26:46 INFO - wptserve == 1.4.0
23:26:46 INFO - Running post-action listener: _resource_record_post_action
23:26:46 INFO - Running post-action listener: _start_resource_monitoring
23:26:46 INFO - Starting resource monitoring.
23:26:46 INFO - [mozharness: 2016-10-28 06:26:46.987000Z] Finished create-virtualenv step (success)
23:26:46 INFO - [mozharness: 2016-10-28 06:26:46.987000Z] Running pull step.
23:26:46 INFO - Running pre-action listener: _resource_record_pre_action
23:26:46 INFO - Running main action method: pull
23:26:46 INFO - Pull has nothing to do!
23:26:46 INFO - Running post-action listener: _resource_record_post_action
23:26:46 INFO - [mozharness: 2016-10-28 06:26:46.988000Z] Finished pull step (success)
23:26:46 INFO - [mozharness: 2016-10-28 06:26:46.988000Z] Running install step.
23:26:46 INFO - Running pre-action listener: _resource_record_pre_action
23:26:46 INFO - Running main action method: install
23:26:46 INFO - Getting output from command: ['C:\\slave\\test\\build\\venv\\Scripts\\pip', 'freeze']
23:26:46 INFO - Copy/paste: C:\slave\test\build\venv\Scripts\pip freeze
23:26:47 INFO - Reading from file tmpfile_stdout
23:26:47 INFO - Using _rmtree_windows ...
23:26:47 INFO - Using _rmtree_windows ...
23:26:47 INFO - Detecting whether we're running mozinstall >=1.0...
23:26:47 INFO - Getting output from command: ['C:\\slave\\test/build/venv/scripts/python', 'C:\\slave\\test/build/venv/scripts/mozinstall-script.py', '-h']
23:26:47 INFO - Copy/paste: C:\slave\test/build/venv/scripts/python C:\slave\test/build/venv/scripts/mozinstall-script.py -h
23:26:47 INFO - Reading from file tmpfile_stdout
23:26:47 INFO - Output received:
23:26:47 INFO - Usage: mozinstall-script.py [options] installer
23:26:47 INFO - Options:
23:26:47 INFO - -h, --help show this help message and exit
23:26:47 INFO - -d DEST, --destination=DEST
23:26:47 INFO - Directory to install application into. [default:
23:26:47 INFO - "C:\slave\test"]
23:26:47 INFO - --app=APP Application being installed. [default: firefox]
23:26:47 INFO - Using _rmtree_windows ...
23:26:47 INFO - Using _rmtree_windows ...
23:26:47 INFO - mkdir: C:\slave\test\build\application
23:26:47 INFO - Getting output from command: ['C:\\slave\\test/build/venv/scripts/python', 'C:\\slave\\test/build/venv/scripts/mozinstall-script.py', 'C:\\slave\\test\\build\\firefox-52.0a1.en-US.win64.zip', '--destination', 'C:\\slave\\test\\build\\application']
23:26:47 INFO - Copy/paste: C:\slave\test/build/venv/scripts/python C:\slave\test/build/venv/scripts/mozinstall-script.py C:\slave\test\build\firefox-52.0a1.en-US.win64.zip --destination C:\slave\test\build\application
ProcessManager NOT managing child processes
23:26:50 INFO - Reading from file tmpfile_stdout
23:26:50 INFO - Output received:
23:26:50 INFO - C:\slave\test\build\application\firefox\firefox.exe
23:26:50 INFO - Using _rmtree_windows ...
23:26:50 INFO - Using _rmtree_windows ...
23:26:50 INFO - Running post-action listener: _resource_record_post_action
23:26:50 INFO - [mozharness: 2016-10-28 06:26:50.627000Z] Finished install step (success)
23:26:50 INFO - [mozharness: 2016-10-28 06:26:50.627000Z] Running run-tests step.
23:26:50 INFO - Running pre-action listener: _resource_record_pre_action
23:26:50 INFO - Running main action method: run_tests
23:26:50 INFO - mkdir: C:\slave\test\build\blobber_upload_dir
23:26:50 INFO - Minidump filename unknown. Determining based upon platform and architecture.
23:26:50 INFO - Minidump tooltool manifest unknown. Determining based upon platform and architecture.
23:26:50 INFO - grabbing minidump binary from tooltool
23:26:50 INFO - proxxy config: {'regions': ['.use1.', '.usw2.', '.scl3'], 'instances': ['proxxy1.srv.releng.use1.mozilla.com', 'proxxy1.srv.releng.usw2.mozilla.com', 'proxxy1.srv.releng.scl3.mozilla.com'], 'urls': [('http://ftp.mozilla.org', 'ftp.mozilla.org'), ('https://ftp.mozilla.org', 'ftp.mozilla.org'), ('https://ftp-ssl.mozilla.org', 'ftp.mozilla.org'), ('http://pypi.pvt.build.mozilla.org', 'pypi.pvt.build.mozilla.org'), ('http://pypi.pub.build.mozilla.org', 'pypi.pub.build.mozilla.org')]}
23:26:50 INFO - retry: Calling run_command with args: (['c:\\mozilla-build\\python27\\python.exe', 'C:/mozilla-build/tooltool.py', '--url', 'https://api.pub.build.mozilla.org/tooltool/', '--authentication-file', 'c:\\builds\\relengapi.tok', 'fetch', '-m', 'C:\\slave\\test\\build\\tests\\config/tooltool-manifests/win32/releng.manifest', '-o'],), kwargs: {'output_timeout': 600, 'error_list': [{'substr': 'command not found', 'level': 'error'}, {'regex': <_sre.SRE_Pattern object at 0x006F8DE8>, 'level': 'warning'}, {'substr': 'Traceback (most recent call last)', 'level': 'error'}, {'substr': 'SyntaxError: ', 'level': 'error'}, {'substr': 'TypeError: ', 'level': 'error'}, {'substr': 'NameError: ', 'level': 'error'}, {'substr': 'ZeroDivisionError: ', 'level': 'error'}, {'regex': <_sre.SRE_Pattern object at 0x024FF230>, 'level': 'critical'}, {'regex': <_sre.SRE_Pattern object at 0x0257D520>, 'level': 'critical'}, {'substr': 'ERROR - ', 'level': 'error'}], 'cwd': 'C:\\slave\\test\\build', 'privileged': False}, attempt #1
23:26:50 INFO - Running command: ['c:\\mozilla-build\\python27\\python.exe', 'C:/mozilla-build/tooltool.py', '--url', 'https://api.pub.build.mozilla.org/tooltool/', '--authentication-file', 'c:\\builds\\relengapi.tok', 'fetch', '-m', 'C:\\slave\\test\\build\\tests\\config/tooltool-manifests/win32/releng.manifest', '-o'] in C:\slave\test\build
23:26:50 INFO - Copy/paste: c:\mozilla-build\python27\python.exe C:/mozilla-build/tooltool.py --url https://api.pub.build.mozilla.org/tooltool/ --authentication-file c:\builds\relengapi.tok fetch -m C:\slave\test\build\tests\config/tooltool-manifests/win32/releng.manifest -o
23:26:50 INFO - Calling ['c:\\mozilla-build\\python27\\python.exe', 'C:/mozilla-build/tooltool.py', '--url', 'https://api.pub.build.mozilla.org/tooltool/', '--authentication-file', 'c:\\builds\\relengapi.tok', 'fetch', '-m', 'C:\\slave\\test\\build\\tests\\config/tooltool-manifests/win32/releng.manifest', '-o'] with output_timeout 600
ProcessManager UNABLE to use job objects to manage child processes
23:26:50 INFO - INFO - Attempting to fetch from 'https://api.pub.build.mozilla.org/tooltool/'...
23:26:51 INFO - INFO - File win32-minidump_stackwalk.exe fetched from https://api.pub.build.mozilla.org/tooltool/ as C:\slave\test\build\tmp1vs0vp
23:26:51 INFO - INFO - File integrity verified, renaming tmp1vs0vp to win32-minidump_stackwalk.exe
23:26:51 INFO - Return code: 0
23:26:51 INFO - Chmoding C:\slave\test\build\win32-minidump_stackwalk.exe to 0755
23:26:51 INFO - ENV: MINIDUMP_SAVE_PATH is now C:\slave\test\build\blobber_upload_dir
23:26:51 INFO - Running command: ['C:\\slave\\test\\build\\venv\\Scripts\\python', '-u', 'C:\\slave\\test\\build\\tests\\web-platform\\runtests.py', '--log-raw=-', '--log-raw=C:\\slave\\test\\build\\blobber_upload_dir\\wpt_raw.log', '--log-errorsummary=C:\\slave\\test\\build\\blobber_upload_dir\\wpt_errorsummary.log', '--binary=C:\\slave\\test\\build\\application\\firefox\\firefox.exe', '--symbols-path=https://queue.taskcluster.net/v1/task/OLoLuKTcRWO4heHcpf7N8A/artifacts/public/build/firefox-52.0a1.en-US.win64.crashreporter-symbols.zip', '--stackwalk-binary=C:\\slave\\test\\build\\win32-minidump_stackwalk.exe', '--stackfix-dir=C:\\slave\\test\\build\\tests\\bin', '--test-type=testharness', '--disable-e10s', '--total-chunks=10', '--this-chunk=9', '--prefs-root=C:\\slave\\test\\build\\tests\\web-platform/prefs', '--processes=1', '--config=C:\\slave\\test\\build\\tests\\web-platform/wptrunner.ini', '--ca-cert-path=C:\\slave\\test\\build\\tests\\web-platform/certs/cacert.pem', '--host-key-path=C:\\slave\\test\\build\\tests\\web-platform/certs/web-platform.test.key', '--host-cert-path=C:\\slave\\test\\build\\tests\\web-platform/certs/web-platform.test.pem', '--certutil-binary=C:\\slave\\test\\build\\tests/bin/certutil'] in C:\slave\test\build
23:26:51 INFO - Copy/paste: C:\slave\test\build\venv\Scripts\python -u C:\slave\test\build\tests\web-platform\runtests.py --log-raw=- --log-raw=C:\slave\test\build\blobber_upload_dir\wpt_raw.log --log-errorsummary=C:\slave\test\build\blobber_upload_dir\wpt_errorsummary.log --binary=C:\slave\test\build\application\firefox\firefox.exe --symbols-path=https://queue.taskcluster.net/v1/task/OLoLuKTcRWO4heHcpf7N8A/artifacts/public/build/firefox-52.0a1.en-US.win64.crashreporter-symbols.zip --stackwalk-binary=C:\slave\test\build\win32-minidump_stackwalk.exe --stackfix-dir=C:\slave\test\build\tests\bin --test-type=testharness --disable-e10s --total-chunks=10 --this-chunk=9 --prefs-root=C:\slave\test\build\tests\web-platform/prefs --processes=1 --config=C:\slave\test\build\tests\web-platform/wptrunner.ini --ca-cert-path=C:\slave\test\build\tests\web-platform/certs/cacert.pem --host-key-path=C:\slave\test\build\tests\web-platform/certs/web-platform.test.key --host-cert-path=C:\slave\test\build\tests\web-platform/certs/web-platform.test.pem --certutil-binary=C:\slave\test\build\tests/bin/certutil
23:26:51 INFO - Using env: {'ALLUSERSPROFILE': 'C:\\ProgramData',
23:26:51 INFO - 'APPDATA': 'C:\\Users\\cltbld.T-W864-IX-138\\AppData\\Roaming',
23:26:51 INFO - 'COMMONPROGRAMFILES': 'C:\\Program Files (x86)\\Common Files',
23:26:51 INFO - 'COMMONPROGRAMFILES(X86)': 'C:\\Program Files (x86)\\Common Files',
23:26:51 INFO - 'COMMONPROGRAMW6432': 'C:\\Program Files\\Common Files',
23:26:51 INFO - 'COMPUTERNAME': 'T-W864-IX-138',
23:26:51 INFO - 'COMSPEC': 'C:\\windows\\system32\\cmd.exe',
23:26:51 INFO - 'DCLOCATION': 'SCL3',
23:26:51 INFO - 'DNSSUFFIX': 'wintest.releng.scl3.mozilla.com',
23:26:51 INFO - 'FP_NO_HOST_CHECK': 'NO',
23:26:51 INFO - 'HOMEDRIVE': 'C:',
23:26:51 INFO - 'HOMEPATH': '\\Users\\cltbld.T-W864-IX-138',
23:26:51 INFO - 'KTS_HOME': 'C:\\Program Files\\KTS',
23:26:51 INFO - 'KTS_VERSION': '1.19c',
23:26:51 INFO - 'LOCALAPPDATA': 'C:\\Users\\cltbld.T-W864-IX-138\\AppData\\Local',
23:26:51 INFO - 'LOGONSERVER': '\\\\T-W864-IX-138',
23:26:51 INFO - 'MINIDUMP_SAVE_PATH': 'C:\\slave\\test\\build\\blobber_upload_dir',
23:26:51 INFO - 'MONDIR': 'C:\\Monitor_config\\',
23:26:51 INFO - 'MOZBUILDDIR': 'C:\\mozilla-build\\',
23:26:51 INFO - 'MOZ_CRASHREPORTER_NO_REPORT': '1',
23:26:51 INFO - 'MOZ_HIDE_RESULTS_TABLE': '1',
23:26:51 INFO - 'MOZ_NO_REMOTE': '1',
23:26:51 INFO - 'NO_EM_RESTART': '1',
23:26:51 INFO - 'NO_FAIL_ON_TEST_ERRORS': '1',
23:26:51 INFO - 'NUMBER_OF_PROCESSORS': '8',
23:26:51 INFO - 'OS': 'Windows_NT',
23:26:51 INFO - 'OURDRIVE': 'C:',
23:26:51 INFO - 'PATH': 'C:\\Program Files (x86)\\NVIDIA Corporation\\PhysX\\Common;C:\\windows\\system32;C:\\windows;C:\\windows\\System32\\Wbem;C:\\windows\\System32\\WindowsPowerShell\\v1.0\\;C:\\mozilla-build\\python27;C:\\mozilla-build\\python27\\Scripts;C:\\mozilla-build\\msys\\bin;C:\\mozilla-build\\vim\\vim72;C:\\mozilla-build\\wget;C:\\mozilla-build\\info-zip;C:\\CoreUtils\\bin;C:\\mozilla-build\\buildbotve\\scripts;C:\\mozilla-build\\hg',
23:26:51 INFO - 'PATHEXT': '.COM;.EXE;.BAT;.CMD;.VBS;.VBE;.JS;.JSE;.WSF;.WSH;.MSC',
23:26:51 INFO - 'PROCESSOR_ARCHITECTURE': 'x86',
23:26:51 INFO - 'PROCESSOR_ARCHITEW6432': 'AMD64',
23:26:51 INFO - 'PROCESSOR_IDENTIFIER': 'Intel64 Family 6 Model 30 Stepping 5, GenuineIntel',
23:26:51 INFO - 'PROCESSOR_LEVEL': '6',
23:26:51 INFO - 'PROCESSOR_REVISION': '1e05',
23:26:51 INFO - 'PROGRAMDATA': 'C:\\ProgramData',
23:26:51 INFO - 'PROGRAMFILES': 'C:\\Program Files (x86)',
23:26:51 INFO - 'PROGRAMFILES(X86)': 'C:\\Program Files (x86)',
23:26:51 INFO - 'PROGRAMW6432': 'C:\\Program Files',
23:26:51 INFO - 'PROMPT': '$P$G',
23:26:51 INFO - 'PROPERTIES_FILE': 'C:\\slave\\test/buildprops.json',
23:26:51 INFO - 'PSMODULEPATH': 'C:\\windows\\system32\\WindowsPowerShell\\v1.0\\Modules\\',
23:26:51 INFO - 'PUBLIC': 'C:\\Users\\Public',
23:26:51 INFO - 'PWD': 'C:\\slave\\test',
23:26:51 INFO - 'RUNLOGFILE': 'C:\\slave\\\\runslave.log',
23:26:51 INFO - 'SLAVEDIR': 'C:\\slave\\',
23:26:51 INFO - 'SYSTEMDRIVE': 'C:',
23:26:51 INFO - 'SYSTEMROOT': 'C:\\windows',
23:26:51 INFO - 'TEMP': 'C:\\Users\\CLTBLD~1.T-W\\AppData\\Local\\Temp',
23:26:51 INFO - 'TEST1': 'testie',
23:26:51 INFO - 'TMP': 'C:\\Users\\CLTBLD~1.T-W\\AppData\\Local\\Temp',
23:26:51 INFO - 'USERDOMAIN': 'T-W864-IX-138',
23:26:51 INFO - 'USERDOMAIN_ROAMINGPROFILE': 'T-W864-IX-138',
23:26:51 INFO - 'USERNAME': 'cltbld',
23:26:51 INFO - 'USERPROFILE': 'C:\\Users\\cltbld.T-W864-IX-138',
23:26:51 INFO - 'WINDIR': 'C:\\windows',
23:26:51 INFO - 'XPCOM_DEBUG_BREAK': 'warn'}
23:26:51 INFO - Calling ['C:\\slave\\test\\build\\venv\\Scripts\\python', '-u', 'C:\\slave\\test\\build\\tests\\web-platform\\runtests.py', '--log-raw=-', '--log-raw=C:\\slave\\test\\build\\blobber_upload_dir\\wpt_raw.log', '--log-errorsummary=C:\\slave\\test\\build\\blobber_upload_dir\\wpt_errorsummary.log', '--binary=C:\\slave\\test\\build\\application\\firefox\\firefox.exe', '--symbols-path=https://queue.taskcluster.net/v1/task/OLoLuKTcRWO4heHcpf7N8A/artifacts/public/build/firefox-52.0a1.en-US.win64.crashreporter-symbols.zip', '--stackwalk-binary=C:\\slave\\test\\build\\win32-minidump_stackwalk.exe', '--stackfix-dir=C:\\slave\\test\\build\\tests\\bin', '--test-type=testharness', '--disable-e10s', '--total-chunks=10', '--this-chunk=9', '--prefs-root=C:\\slave\\test\\build\\tests\\web-platform/prefs', '--processes=1', '--config=C:\\slave\\test\\build\\tests\\web-platform/wptrunner.ini', '--ca-cert-path=C:\\slave\\test\\build\\tests\\web-platform/certs/cacert.pem', '--host-key-path=C:\\slave\\test\\build\\tests\\web-platform/certs/web-platform.test.key', '--host-cert-path=C:\\slave\\test\\build\\tests\\web-platform/certs/web-platform.test.pem', '--certutil-binary=C:\\slave\\test\\build\\tests/bin/certutil'] with output_timeout 1000
ProcessManager NOT managing child processes
ProcessManager UNABLE to use job objects to manage child processes
23:26:54 INFO - STDERR: C:\slave\test\build\venv\lib\site-packages\mozrunner\utils.py:18: UserWarning: Module wptserve was already imported from C:\slave\test\build\tests\web-platform\tests\tools\wptserve\wptserve\__init__.py, but c:\slave\test\build\venv\lib\site-packages is being added to sys.path
23:26:54 INFO - import pkg_resources
23:26:54 INFO - STDERR: Opening manifest at C:\slave\test\build\tests\web-platform\meta\MANIFEST.json
23:26:54 INFO - STDERR: Opening manifest at C:\slave\test\build\tests\web-platform\mozilla\meta\MANIFEST.json
23:27:01 INFO - Using 1 client processes
23:27:04 INFO - SUITE-START | Running 828 tests
23:27:04 INFO - Running testharness tests
23:27:04 INFO - TEST-START | /WebCryptoAPI/derive_bits_keys/pbkdf2.worker
23:27:04 INFO - TEST-SKIP | /WebCryptoAPI/derive_bits_keys/pbkdf2.worker | took 0ms
23:27:04 INFO - TEST-START | /WebCryptoAPI/derive_bits_keys/test_pbkdf2.html
23:27:04 INFO - TEST-SKIP | /WebCryptoAPI/derive_bits_keys/test_pbkdf2.html | took 0ms
23:27:04 INFO - TEST-START | /XMLHttpRequest/send-redirect-post-upload.htm
23:27:04 INFO - TEST-SKIP | /XMLHttpRequest/send-redirect-post-upload.htm | took 1ms
23:27:04 INFO - TEST-START | /custom-elements/v0/registering/definition-construction-algorithm-default-namespace.html
23:27:04 INFO - TEST-SKIP | /custom-elements/v0/registering/definition-construction-algorithm-default-namespace.html | took 0ms
23:27:04 INFO - TEST-START | /custom-elements/v0/registering/definition-construction-algorithm-duplicate-definition.html
23:27:04 INFO - TEST-SKIP | /custom-elements/v0/registering/definition-construction-algorithm-duplicate-definition.html | took 0ms
23:27:04 INFO - TEST-START | /custom-elements/v0/registering/definition-construction-algorithm-invalid-type.html
23:27:04 INFO - TEST-SKIP | /custom-elements/v0/registering/definition-construction-algorithm-invalid-type.html | took 0ms
23:27:04 INFO - TEST-START | /custom-elements/v0/registering/definition-construction-algorithm-local-name-lowercased.html
23:27:04 INFO - TEST-SKIP | /custom-elements/v0/registering/definition-construction-algorithm-local-name-lowercased.html | took 0ms
23:27:04 INFO - TEST-START | /custom-elements/v0/registering/definition-construction-algorithm-name-is-null.html
23:27:04 INFO - TEST-SKIP | /custom-elements/v0/registering/definition-construction-algorithm-name-is-null.html | took 0ms
23:27:04 INFO - TEST-START | /custom-elements/v0/registering/definition-construction-algorithm-no-interface-for-name.html
23:27:04 INFO - TEST-SKIP | /custom-elements/v0/registering/definition-construction-algorithm-no-interface-for-name.html | took 0ms
23:27:04 INFO - TEST-START | /custom-elements/v0/registering/definition-construction-algorithm-svg-namespace-name-is-null.html
23:27:04 INFO - TEST-SKIP | /custom-elements/v0/registering/definition-construction-algorithm-svg-namespace-name-is-null.html | took 0ms
23:27:04 INFO - TEST-START | /custom-elements/v0/registering/definition-construction-algorithm-svg-namespace.html
23:27:04 INFO - TEST-SKIP | /custom-elements/v0/registering/definition-construction-algorithm-svg-namespace.html | took 1ms
23:27:04 INFO - TEST-START | /custom-elements/v0/registering/definition-construction-algorithm-type-name-lowercased.html
23:27:04 INFO - TEST-SKIP | /custom-elements/v0/registering/definition-construction-algorithm-type-name-lowercased.html | took 0ms
23:27:04 INFO - TEST-START | /custom-elements/v0/registering/element-registration-algorithm-no-registry.html
23:27:04 INFO - TEST-SKIP | /custom-elements/v0/registering/element-registration-algorithm-no-registry.html | took 0ms
23:27:04 INFO - TEST-START | /custom-elements/v0/registering/unresolved-elements-interface-html-element.html
23:27:04 INFO - TEST-SKIP | /custom-elements/v0/registering/unresolved-elements-interface-html-element.html | took 0ms
23:27:04 INFO - TEST-START | /custom-elements/v0/registering/unresolved-elements-interface-html-unknown-element.html
23:27:04 INFO - TEST-SKIP | /custom-elements/v0/registering/unresolved-elements-interface-html-unknown-element.html | took 0ms
23:27:04 INFO - TEST-START | /custom-elements/v0/registering/unresolved-elements-interface-svg-element.html
23:27:04 INFO - TEST-SKIP | /custom-elements/v0/registering/unresolved-elements-interface-svg-element.html | took 1ms
23:27:04 INFO - TEST-START | /dom/nodes/Document-contentType/contentType/contenttype_bmp.html
23:27:04 INFO - TEST-SKIP | /dom/nodes/Document-contentType/contentType/contenttype_bmp.html | took 0ms
23:27:04 INFO - TEST-START | /html/browsers/history/the-history-interface/traverse_the_history_write_onload_1.html
23:27:04 INFO - TEST-SKIP | /html/browsers/history/the-history-interface/traverse_the_history_write_onload_1.html | took 1ms
23:27:04 INFO - TEST-START | /html/browsers/history/the-history-interface/traverse_the_history_write_onload_2.html
23:27:04 INFO - TEST-SKIP | /html/browsers/history/the-history-interface/traverse_the_history_write_onload_2.html | took 0ms
23:27:04 INFO - TEST-START | /referrer-policy/generic/subresource-test/area-navigate.html
23:27:04 INFO - TEST-SKIP | /referrer-policy/generic/subresource-test/area-navigate.html | took 1ms
23:27:04 INFO - TEST-START | /referrer-policy/generic/subresource-test/attr-referrer-invalid-value.html
23:27:04 INFO - TEST-SKIP | /referrer-policy/generic/subresource-test/attr-referrer-invalid-value.html | took 0ms
23:27:04 INFO - TEST-START | /referrer-policy/generic/subresource-test/fetch-messaging.html
23:27:04 INFO - TEST-SKIP | /referrer-policy/generic/subresource-test/fetch-messaging.html | took 1ms
23:27:04 INFO - TEST-START | /referrer-policy/generic/subresource-test/iframe-messaging.html
23:27:04 INFO - TEST-SKIP | /referrer-policy/generic/subresource-test/iframe-messaging.html | took 0ms
23:27:04 INFO - TEST-START | /referrer-policy/generic/subresource-test/image-decoding.html
23:27:04 INFO - TEST-SKIP | /referrer-policy/generic/subresource-test/image-decoding.html | took 0ms
23:27:04 INFO - TEST-START | /referrer-policy/generic/subresource-test/link-navigate.html
23:27:04 INFO - TEST-SKIP | /referrer-policy/generic/subresource-test/link-navigate.html | took 0ms
23:27:04 INFO - TEST-START | /referrer-policy/generic/subresource-test/script-messaging.html
23:27:04 INFO - TEST-SKIP | /referrer-policy/generic/subresource-test/script-messaging.html | took 0ms
23:27:04 INFO - TEST-START | /referrer-policy/generic/subresource-test/worker-messaging.html
23:27:04 INFO - TEST-SKIP | /referrer-policy/generic/subresource-test/worker-messaging.html | took 0ms
23:27:04 INFO - TEST-START | /referrer-policy/generic/subresource-test/xhr-messaging.html
23:27:04 INFO - TEST-SKIP | /referrer-policy/generic/subresource-test/xhr-messaging.html | took 6ms
23:27:04 INFO - TEST-START | /referrer-policy/no-referrer-when-downgrade/meta-referrer/same-origin/http-https/img-tag/upgrade-protocol.keep-origin-redirect.http.html
23:27:04 INFO - TEST-SKIP | /referrer-policy/no-referrer-when-downgrade/meta-referrer/same-origin/http-https/img-tag/upgrade-protocol.keep-origin-redirect.http.html | took 1ms
23:27:04 INFO - TEST-START | /referrer-policy/no-referrer-when-downgrade/meta-referrer/same-origin/http-https/img-tag/upgrade-protocol.no-redirect.http.html
23:27:04 INFO - TEST-SKIP | /referrer-policy/no-referrer-when-downgrade/meta-referrer/same-origin/http-https/img-tag/upgrade-protocol.no-redirect.http.html | took 0ms
23:27:04 INFO - TEST-START | /referrer-policy/no-referrer-when-downgrade/meta-referrer/same-origin/http-https/img-tag/upgrade-protocol.swap-origin-redirect.http.html
23:27:04 INFO - TEST-SKIP | /referrer-policy/no-referrer-when-downgrade/meta-referrer/same-origin/http-https/img-tag/upgrade-protocol.swap-origin-redirect.http.html | took 0ms
23:27:04 INFO - TEST-START | /referrer-policy/origin-when-cross-origin/meta-referrer/cross-origin/http-http/img-tag/cross-origin.keep-origin-redirect.http.html
23:27:04 INFO - TEST-SKIP | /referrer-policy/origin-when-cross-origin/meta-referrer/cross-origin/http-http/img-tag/cross-origin.keep-origin-redirect.http.html | took 1ms
23:27:04 INFO - TEST-START | /referrer-policy/origin-when-cross-origin/meta-referrer/cross-origin/http-http/img-tag/cross-origin.no-redirect.http.html
23:27:04 INFO - TEST-SKIP | /referrer-policy/origin-when-cross-origin/meta-referrer/cross-origin/http-http/img-tag/cross-origin.no-redirect.http.html | took 1ms
23:27:04 INFO - TEST-START | /referrer-policy/origin-when-cross-origin/meta-referrer/cross-origin/http-http/img-tag/cross-origin.swap-origin-redirect.http.html
23:27:04 INFO - TEST-SKIP | /referrer-policy/origin-when-cross-origin/meta-referrer/cross-origin/http-http/img-tag/cross-origin.swap-origin-redirect.http.html | took 0ms
23:27:04 INFO - TEST-START | /service-workers/service-worker/appcache-ordering-main.https.html
23:27:04 INFO - TEST-SKIP | /service-workers/service-worker/appcache-ordering-main.https.html | took 0ms
23:27:04 INFO - TEST-START | /service-workers/service-worker/resource-timing.https.html
23:27:04 INFO - TEST-SKIP | /service-workers/service-worker/resource-timing.https.html | took 0ms
23:27:04 INFO - TEST-START | /webgl/conformance-1.0.3/conformance/glsl/matrices/glsl-mat3-construction.html
23:27:04 INFO - TEST-SKIP | /webgl/conformance-1.0.3/conformance/glsl/matrices/glsl-mat3-construction.html | took 0ms
23:27:04 INFO - TEST-START | /webgl/conformance-1.0.3/conformance/glsl/matrices/glsl-mat4-to-mat3.html
23:27:04 INFO - TEST-SKIP | /webgl/conformance-1.0.3/conformance/glsl/matrices/glsl-mat4-to-mat3.html | took 0ms
23:27:04 INFO - TEST-START | /webgl/conformance-1.0.3/conformance/glsl/reserved/_webgl_field.vert.html
23:27:04 INFO - TEST-SKIP | /webgl/conformance-1.0.3/conformance/glsl/reserved/_webgl_field.vert.html | took 0ms
23:27:04 INFO - TEST-START | /webgl/conformance-1.0.3/conformance/glsl/reserved/_webgl_function.vert.html
23:27:04 INFO - TEST-SKIP | /webgl/conformance-1.0.3/conformance/glsl/reserved/_webgl_function.vert.html | took 0ms
23:27:04 INFO - TEST-START | /webgl/conformance-1.0.3/conformance/glsl/reserved/_webgl_struct.vert.html
23:27:04 INFO - TEST-SKIP | /webgl/conformance-1.0.3/conformance/glsl/reserved/_webgl_struct.vert.html | took 0ms
23:27:04 INFO - TEST-START | /webgl/conformance-1.0.3/conformance/glsl/reserved/_webgl_variable.vert.html
23:27:04 INFO - TEST-SKIP | /webgl/conformance-1.0.3/conformance/glsl/reserved/_webgl_variable.vert.html | took 0ms
23:27:04 INFO - TEST-START | /webgl/conformance-1.0.3/conformance/glsl/reserved/webgl_field.vert.html
23:27:04 INFO - TEST-SKIP | /webgl/conformance-1.0.3/conformance/glsl/reserved/webgl_field.vert.html | took 0ms
23:27:04 INFO - TEST-START | /webgl/conformance-1.0.3/conformance/glsl/reserved/webgl_function.vert.html
23:27:04 INFO - TEST-SKIP | /webgl/conformance-1.0.3/conformance/glsl/reserved/webgl_function.vert.html | took 0ms
23:27:04 INFO - TEST-START | /webgl/conformance-1.0.3/conformance/glsl/reserved/webgl_struct.vert.html
23:27:04 INFO - TEST-SKIP | /webgl/conformance-1.0.3/conformance/glsl/reserved/webgl_struct.vert.html | took 0ms
23:27:04 INFO - TEST-START | /webgl/conformance-1.0.3/conformance/glsl/reserved/webgl_variable.vert.html
23:27:04 INFO - TEST-SKIP | /webgl/conformance-1.0.3/conformance/glsl/reserved/webgl_variable.vert.html | took 0ms
23:27:04 INFO - TEST-START | /webgl/conformance-1.0.3/conformance/glsl/variables/gl-fragcoord-xy-values.html
23:27:04 INFO - TEST-SKIP | /webgl/conformance-1.0.3/conformance/glsl/variables/gl-fragcoord-xy-values.html | took 0ms
23:27:04 INFO - TEST-START | /webgl/conformance-1.0.3/conformance/glsl/variables/gl-fragcoord.html
23:27:04 INFO - TEST-SKIP | /webgl/conformance-1.0.3/conformance/glsl/variables/gl-fragcoord.html | took 0ms
23:27:04 INFO - TEST-START | /webgl/conformance-1.0.3/conformance/glsl/variables/gl-fragdata-and-fragcolor.html
23:27:04 INFO - TEST-SKIP | /webgl/conformance-1.0.3/conformance/glsl/variables/gl-fragdata-and-fragcolor.html | took 0ms
23:27:04 INFO - TEST-START | /webgl/conformance-1.0.3/conformance/glsl/variables/gl-frontfacing.html
23:27:04 INFO - TEST-SKIP | /webgl/conformance-1.0.3/conformance/glsl/variables/gl-frontfacing.html | took 1ms
23:27:04 INFO - TEST-START | /webgl/conformance-1.0.3/conformance/glsl/variables/gl-pointcoord.html
23:27:04 INFO - TEST-SKIP | /webgl/conformance-1.0.3/conformance/glsl/variables/gl-pointcoord.html | took 0ms
23:27:04 INFO - TEST-START | /webgl/conformance-1.0.3/conformance/glsl/variables/glsl-built-ins.html
23:27:04 INFO - TEST-SKIP | /webgl/conformance-1.0.3/conformance/glsl/variables/glsl-built-ins.html | took 1ms
23:27:04 INFO - TEST-START | /webgl/conformance-1.0.3/conformance/ogles/GL/atan/atan_001_to_008.html
23:27:04 INFO - TEST-SKIP | /webgl/conformance-1.0.3/conformance/ogles/GL/atan/atan_001_to_008.html | took 0ms
23:27:04 INFO - TEST-START | /webgl/conformance-1.0.3/conformance/ogles/GL/atan/atan_009_to_012.html
23:27:04 INFO - TEST-SKIP | /webgl/conformance-1.0.3/conformance/ogles/GL/atan/atan_009_to_012.html | took 0ms
23:27:04 INFO - TEST-START | /webgl/conformance-1.0.3/conformance/ogles/GL/control_flow/control_flow_001_to_008.html
23:27:04 INFO - TEST-SKIP | /webgl/conformance-1.0.3/conformance/ogles/GL/control_flow/control_flow_001_to_008.html | took 1ms
23:27:04 INFO - TEST-START | /webgl/conformance-1.0.3/conformance/ogles/GL/control_flow/control_flow_009_to_010.html
23:27:04 INFO - TEST-SKIP | /webgl/conformance-1.0.3/conformance/ogles/GL/control_flow/control_flow_009_to_010.html | took 0ms
23:27:04 INFO - TEST-START | /webgl/conformance-1.0.3/conformance/ogles/GL/exp/exp_001_to_008.html
23:27:04 INFO - TEST-SKIP | /webgl/conformance-1.0.3/conformance/ogles/GL/exp/exp_001_to_008.html | took 0ms
23:27:04 INFO - TEST-START | /webgl/conformance-1.0.3/conformance/ogles/GL/exp/exp_009_to_012.html
23:27:04 INFO - TEST-SKIP | /webgl/conformance-1.0.3/conformance/ogles/GL/exp/exp_009_to_012.html | took 1ms
23:27:04 INFO - TEST-START | /webgl/conformance-1.0.3/conformance/ogles/GL/mat3/mat3_001_to_006.html
23:27:04 INFO - TEST-SKIP | /webgl/conformance-1.0.3/conformance/ogles/GL/mat3/mat3_001_to_006.html | took 0ms
23:27:04 INFO - TEST-START | /webgl/conformance-1.0.3/conformance/ogles/GL/matrixCompMult/matrixCompMult_001_to_004.html
23:27:04 INFO - TEST-SKIP | /webgl/conformance-1.0.3/conformance/ogles/GL/matrixCompMult/matrixCompMult_001_to_004.html | took 0ms
23:27:04 INFO - TEST-START | /webgl/conformance-1.0.3/conformance/ogles/GL/min/min_001_to_006.html
23:27:04 INFO - TEST-SKIP | /webgl/conformance-1.0.3/conformance/ogles/GL/min/min_001_to_006.html | took 1ms
23:27:04 INFO - TEST-START | /webgl/conformance-1.0.3/conformance/ogles/GL/step/step_001_to_006.html
23:27:04 INFO - TEST-SKIP | /webgl/conformance-1.0.3/conformance/ogles/GL/step/step_001_to_006.html | took 0ms
23:27:04 INFO - TEST-START | /websockets/interfaces/WebSocket/readyState/001.html
23:27:04 INFO - TEST-SKIP | /websockets/interfaces/WebSocket/readyState/001.html | took 1ms
23:27:04 INFO - TEST-START | /websockets/interfaces/WebSocket/readyState/001.html?wss
23:27:04 INFO - TEST-SKIP | /websockets/interfaces/WebSocket/readyState/001.html?wss | took 0ms
23:27:04 INFO - TEST-START | /websockets/interfaces/WebSocket/readyState/002.html
23:27:04 INFO - TEST-SKIP | /websockets/interfaces/WebSocket/readyState/002.html | took 0ms
23:27:04 INFO - TEST-START | /websockets/interfaces/WebSocket/readyState/002.html?wss
23:27:04 INFO - TEST-SKIP | /websockets/interfaces/WebSocket/readyState/002.html?wss | took 1ms
23:27:04 INFO - TEST-START | /websockets/interfaces/WebSocket/readyState/003.html?wss
23:27:04 INFO - TEST-SKIP | /websockets/interfaces/WebSocket/readyState/003.html?wss | took 0ms
23:27:04 INFO - TEST-START | /websockets/interfaces/WebSocket/readyState/003.html
23:27:04 INFO - TEST-SKIP | /websockets/interfaces/WebSocket/readyState/003.html | took 1ms
23:27:04 INFO - TEST-START | /websockets/interfaces/WebSocket/readyState/004.html?wss
23:27:04 INFO - TEST-SKIP | /websockets/interfaces/WebSocket/readyState/004.html?wss | took 0ms
23:27:04 INFO - TEST-START | /websockets/interfaces/WebSocket/readyState/004.html
23:27:04 INFO - TEST-SKIP | /websockets/interfaces/WebSocket/readyState/004.html | took 0ms
23:27:04 INFO - TEST-START | /websockets/interfaces/WebSocket/readyState/005.html?wss
23:27:04 INFO - TEST-SKIP | /websockets/interfaces/WebSocket/readyState/005.html?wss | took 1ms
23:27:04 INFO - TEST-START | /websockets/interfaces/WebSocket/readyState/005.html
23:27:04 INFO - TEST-SKIP | /websockets/interfaces/WebSocket/readyState/005.html | took 0ms
23:27:04 INFO - TEST-START | /websockets/interfaces/WebSocket/readyState/006.html
23:27:04 INFO - TEST-SKIP | /websockets/interfaces/WebSocket/readyState/006.html | took 0ms
23:27:04 INFO - TEST-START | /websockets/interfaces/WebSocket/readyState/006.html?wss
23:27:04 INFO - TEST-SKIP | /websockets/interfaces/WebSocket/readyState/006.html?wss | took 1ms
23:27:04 INFO - TEST-START | /websockets/interfaces/WebSocket/readyState/007.html
23:27:04 INFO - TEST-SKIP | /websockets/interfaces/WebSocket/readyState/007.html | took 0ms
23:27:04 INFO - TEST-START | /websockets/interfaces/WebSocket/readyState/007.html?wss
23:27:04 INFO - TEST-SKIP | /websockets/interfaces/WebSocket/readyState/007.html?wss | took 1ms
23:27:04 INFO - TEST-START | /websockets/interfaces/WebSocket/readyState/008.html?wss
23:27:04 INFO - TEST-SKIP | /websockets/interfaces/WebSocket/readyState/008.html?wss | took 0ms
23:27:04 INFO - TEST-START | /websockets/interfaces/WebSocket/readyState/008.html
23:27:04 INFO - TEST-SKIP | /websockets/interfaces/WebSocket/readyState/008.html | took 0ms
23:27:04 INFO - Setting up ssl
23:27:05 INFO - PROCESS | certutil |
23:27:05 INFO - PROCESS | certutil |
23:27:05 INFO - PROCESS | certutil |
23:27:05 INFO - Certificate Nickname Trust Attributes
23:27:05 INFO - SSL,S/MIME,JAR/XPI
23:27:05 INFO -
23:27:05 INFO - web-platform-tests CT,,
23:27:05 INFO -
23:27:05 INFO - Application command: C:\slave\test\build\application\firefox\firefox.exe -marionette about:blank -profile c:\users\cltbld~1.t-w\appdata\local\temp\tmpkxn5_b.mozrunner
23:27:05 INFO - Starting runner
23:27:05 INFO - PROCESS | 4084 | [4084] WARNING: Failed to load startupcache file correctly, removing!: file c:/builds/moz2_slave/fx-team-w64-d-0000000000000000/build/src/startupcache/StartupCache.cpp, line 219
23:27:05 INFO - PROCESS | 4084 | [4084] WARNING: NS_ENSURE_SUCCESS(rv, rv) failed with result 0x80004005: file c:/builds/moz2_slave/fx-team-w64-d-0000000000000000/build/src/xpcom/base/nsSystemInfo.cpp, line 116
23:27:06 INFO - PROCESS | 4084 | [4084] WARNING: This method is lossy. Use GetCanonicalPath !: file c:/builds/moz2_slave/fx-team-w64-d-0000000000000000/build/src/xpcom/io/nsLocalFileWin.cpp, line 3579
23:27:07 INFO - PROCESS | 4084 | 1477636027667 Marionette DEBUG Marionette enabled via build flag and pref
23:27:08 INFO - PROCESS | 4084 | ++DOCSHELL 0000007678E87800 == 1 [pid = 4084] [id = 1]
23:27:08 INFO - PROCESS | 4084 | ++DOMWINDOW == 1 (0000007678E88000) [pid = 4084] [serial = 1] [outer = 0000000000000000]
23:27:08 INFO - PROCESS | 4084 | ++DOMWINDOW == 2 (0000007678E89000) [pid = 4084] [serial = 2] [outer = 0000007678E88000]
23:27:09 INFO - PROCESS | 4084 | ++DOCSHELL 000000767AE67000 == 2 [pid = 4084] [id = 2]
23:27:09 INFO - PROCESS | 4084 | ++DOMWINDOW == 3 (000000767E037000) [pid = 4084] [serial = 3] [outer = 0000000000000000]
23:27:09 INFO - PROCESS | 4084 | ++DOMWINDOW == 4 (000000767E038000) [pid = 4084] [serial = 4] [outer = 000000767E037000]
23:27:09 INFO - PROCESS | 4084 | 1477636029704 Marionette INFO Listening on port 2828
23:27:11 INFO - PROCESS | 4084 | 1477636031831 Marionette DEBUG Marionette enabled via command-line flag
23:27:11 INFO - PROCESS | 4084 | ++DOCSHELL 000000767A2A7800 == 3 [pid = 4084] [id = 3]
23:27:11 INFO - PROCESS | 4084 | ++DOMWINDOW == 5 (000000767A2B6800) [pid = 4084] [serial = 5] [outer = 0000000000000000]
23:27:11 INFO - PROCESS | 4084 | ++DOMWINDOW == 6 (000000767A2B7800) [pid = 4084] [serial = 6] [outer = 000000767A2B6800]
23:27:12 INFO - PROCESS | 4084 | ++DOMWINDOW == 7 (000000767FC2F000) [pid = 4084] [serial = 7] [outer = 000000767E037000]
23:27:12 INFO - PROCESS | 4084 | 1477636032926 Marionette DEBUG Accepted connection conn0 from 127.0.0.1:49273
23:27:12 INFO - PROCESS | 4084 | 1477636032945 Marionette DEBUG Accepted connection conn1 from 127.0.0.1:49274
23:27:12 INFO - PROCESS | 4084 | 1477636032953 Marionette DEBUG Accepted connection conn2 from 127.0.0.1:49275
23:27:12 INFO - PROCESS | 4084 | 1477636032959 Marionette DEBUG Accepted connection conn3 from 127.0.0.1:49276
23:27:13 INFO - PROCESS | 4084 | 1477636032993 Marionette DEBUG Accepted connection conn4 from 127.0.0.1:49277
23:27:13 INFO - PROCESS | 4084 | 1477636032998 Marionette DEBUG Accepted connection conn5 from 127.0.0.1:49278
23:27:13 INFO - PROCESS | 4084 | 1477636033002 Marionette DEBUG Closed connection conn0
23:27:13 INFO - PROCESS | 4084 | 1477636033004 Marionette DEBUG Closed connection conn1
23:27:13 INFO - PROCESS | 4084 | 1477636033007 Marionette DEBUG Closed connection conn2
23:27:13 INFO - PROCESS | 4084 | 1477636033009 Marionette DEBUG Closed connection conn3
23:27:13 INFO - PROCESS | 4084 | 1477636033053 Marionette DEBUG Closed connection conn4
23:27:13 INFO - PROCESS | 4084 | 1477636033198 Marionette DEBUG Closed connection conn5
23:27:13 INFO - PROCESS | 4084 | 1477636033202 Marionette DEBUG Accepted connection conn6 from 127.0.0.1:49279
23:27:13 INFO - PROCESS | 4084 | 1477636033210 Marionette DEBUG Closed connection conn6
23:27:13 INFO - PROCESS | 4084 | 1477636033214 Marionette DEBUG Accepted connection conn7 from 127.0.0.1:49280
23:27:13 INFO - PROCESS | 4084 | ++DOCSHELL 0000007600524800 == 4 [pid = 4084] [id = 4]
23:27:13 INFO - PROCESS | 4084 | ++DOMWINDOW == 8 (0000007600526800) [pid = 4084] [serial = 8] [outer = 0000000000000000]
23:27:13 INFO - PROCESS | 4084 | ++DOMWINDOW == 9 (0000007600538000) [pid = 4084] [serial = 9] [outer = 0000007600526800]
23:27:13 INFO - PROCESS | 4084 | ++DOMWINDOW == 10 (0000007602B13000) [pid = 4084] [serial = 10] [outer = 0000007600526800]
23:27:13 INFO - PROCESS | 4084 | 1477636033404 Marionette TRACE conn7 -> [0,1,"newSession",{"sessionId":null,"capabilities":null}]
23:27:13 INFO - PROCESS | 4084 | 1477636033410 Marionette CONFIG Changing capabilities: {"browserName":"firefox","browserVersion":"52.0a1","platformName":"windows_nt","platformVersion":"6.2","specificationLevel":0,"raisesAccessibilityExceptions":false,"rotatable":false,"acceptSslCerts":false,"takesElementScreenshot":true,"takesScreenshot":true,"proxy":{},"platform":"WINDOWS_NT","XULappId":"{ec8030f7-c20a-464f-9b0e-13a3a9e97384}","appBuildId":"20161027204059","processId":4084,"version":"52.0a1"}
23:27:14 INFO - PROCESS | 4084 | [4084] WARNING: getting z level of unregistered window: file c:/builds/moz2_slave/fx-team-w64-d-0000000000000000/build/src/xpfe/appshell/nsWindowMediator.cpp, line 623
23:27:14 INFO - PROCESS | 4084 | [4084] WARNING: getting z level of unregistered window: file c:/builds/moz2_slave/fx-team-w64-d-0000000000000000/build/src/xpfe/appshell/nsWindowMediator.cpp, line 623
23:27:14 INFO - PROCESS | 4084 | [4084] WARNING: attempt to modify an immutable nsStandardURL: file c:/builds/moz2_slave/fx-team-w64-d-0000000000000000/build/src/netwerk/base/nsStandardURL.cpp, line 1553
23:27:14 INFO - PROCESS | 4084 | [4084] WARNING: attempt to modify an immutable nsStandardURL: file c:/builds/moz2_slave/fx-team-w64-d-0000000000000000/build/src/netwerk/base/nsStandardURL.cpp, line 1553
23:27:14 INFO - PROCESS | 4084 | [4084] WARNING: Failed to retarget HTML data delivery to the parser thread.: file c:/builds/moz2_slave/fx-team-w64-d-0000000000000000/build/src/parser/html/nsHtml5StreamParser.cpp, line 970
23:27:14 INFO - PROCESS | 4084 | ++DOCSHELL 000000760599F800 == 5 [pid = 4084] [id = 5]
23:27:14 INFO - PROCESS | 4084 | ++DOMWINDOW == 11 (00000076059A0000) [pid = 4084] [serial = 11] [outer = 0000000000000000]
23:27:14 INFO - PROCESS | 4084 | ++DOCSHELL 00000076059A1000 == 6 [pid = 4084] [id = 6]
23:27:14 INFO - PROCESS | 4084 | ++DOMWINDOW == 12 (00000076059A1800) [pid = 4084] [serial = 12] [outer = 0000000000000000]
23:27:15 INFO - PROCESS | 4084 | ++DOCSHELL 0000007606D4C000 == 7 [pid = 4084] [id = 7]
23:27:15 INFO - PROCESS | 4084 | ++DOMWINDOW == 13 (0000007606D5B000) [pid = 4084] [serial = 13] [outer = 0000000000000000]
23:27:15 INFO - PROCESS | 4084 | ++DOMWINDOW == 14 (0000007607009800) [pid = 4084] [serial = 14] [outer = 0000007606D5B000]
23:27:15 INFO - PROCESS | 4084 | ++DOMWINDOW == 15 (000000760751B000) [pid = 4084] [serial = 15] [outer = 00000076059A0000]
23:27:15 INFO - PROCESS | 4084 | ++DOMWINDOW == 16 (000000760751E000) [pid = 4084] [serial = 16] [outer = 00000076059A1800]
23:27:15 INFO - PROCESS | 4084 | ++DOMWINDOW == 17 (0000007607522000) [pid = 4084] [serial = 17] [outer = 0000007606D5B000]
23:27:16 INFO - PROCESS | 4084 | 1477636036591 Marionette DEBUG loaded listener.js
23:27:17 INFO - PROCESS | 4084 | ++DOMWINDOW == 18 (000000767F1D7800) [pid = 4084] [serial = 18] [outer = 0000007606D5B000]
23:27:17 INFO - PROCESS | 4084 | 1477636037779 Marionette TRACE conn7 <- [1,1,null,{"sessionId":"3df2f3e4-a23d-4fea-b23e-38f952522e69","capabilities":{"browserName":"firefox","browserVersion":"52.0a1","platformName":"windows_nt","platformVersion":"6.2","specificationLevel":0,"raisesAccessibilityExceptions":false,"rotatable":false,"acceptSslCerts":false,"takesElementScreenshot":true,"takesScreenshot":true,"proxy":{},"platform":"WINDOWS_NT","XULappId":"{ec8030f7-c20a-464f-9b0e-13a3a9e97384}","appBuildId":"20161027204059","processId":4084,"version":"52.0a1","command_id":1}}]
23:27:19 INFO - PROCESS | 4084 | 1477636039146 Marionette TRACE conn7 -> [0,2,"executeScript",{"scriptTimeout":null,"newSandbox":true,"args":[],"filename":"executormarionette.py","script":"if (window.wrappedJSObject.win) {window.wrappedJSObject.win.close()}","sandbox":"default","line":137}]
23:27:19 INFO - PROCESS | 4084 | 1477636039419 Marionette TRACE conn7 <- [1,2,null,{"value":null}]
23:27:19 INFO - PROCESS | 4084 | --DOCSHELL 0000007678E87800 == 6 [pid = 4084] [id = 1]
23:27:19 INFO - PROCESS | 4084 | 1477636039668 Marionette TRACE conn7 -> [0,3,"getWindowHandle",null]
23:27:19 INFO - PROCESS | 4084 | 1477636039672 Marionette TRACE conn7 <- [1,3,null,{"value":"13"}]
23:27:19 INFO - PROCESS | 4084 | 1477636039714 Marionette TRACE conn7 -> [0,4,"get",{"url":"http://web-platform.test:8000/testharness_runner.html"}]
23:27:19 INFO - PROCESS | 4084 | [4084] WARNING: Could not get disk status from nsIDiskSpaceWatcher: file c:/builds/moz2_slave/fx-team-w64-d-0000000000000000/build/src/uriloader/prefetch/nsOfflineCacheUpdateService.cpp, line 283
23:27:19 INFO - PROCESS | 4084 | ++DOMWINDOW == 19 (00000076068C6800) [pid = 4084] [serial = 19] [outer = 0000007606D5B000]
23:27:20 INFO - PROCESS | 4084 | 1477636040219 Marionette TRACE conn7 <- [1,4,null,{}]
23:27:20 INFO - PROCESS | 4084 | 1477636040225 Marionette TRACE conn7 -> [0,5,"executeScript",{"scriptTimeout":null,"newSandbox":true,"args":[],"filename":"executormarionette.py","script":"document.title = 'MainThread'","sandbox":"default","line":150}]
23:27:20 INFO - PROCESS | 4084 | 1477636040253 Marionette TRACE conn7 <- [1,5,null,{"value":null}]
23:27:20 INFO - PROCESS | 4084 | 1477636040275 Marionette TRACE conn7 -> [0,6,"getWindowHandle",null]
23:27:20 INFO - PROCESS | 4084 | 1477636040279 Marionette TRACE conn7 <- [1,6,null,{"value":"13"}]
23:27:20 INFO - TEST-START | /2dcontext/image-smoothing/imagesmoothing.html
23:27:20 INFO - PROCESS | 4084 | 1477636040286 Marionette TRACE conn7 -> [0,7,"timeouts",{"script":35000}]
23:27:20 INFO - PROCESS | 4084 | 1477636040293 Marionette TRACE conn7 <- [1,7,null,{}]
23:27:20 INFO - PROCESS | 4084 | 1477636040323 Marionette TRACE conn7 -> [0,8,"executeScript",{"scriptTimeout":null,"newSandbox":true,"args":[],"filename":"executormarionette.py","script":"if (window.wrappedJSObject.win) {window.wrappedJSObject.win.close()}","sandbox":"default","line":430}]
23:27:20 INFO - PROCESS | 4084 | 1477636040349 Marionette TRACE conn7 <- [1,8,null,{"value":null}]
23:27:20 INFO - PROCESS | 4084 | 1477636040352 Marionette TRACE conn7 -> [0,9,"getWindowHandles",null]
23:27:20 INFO - PROCESS | 4084 | 1477636040355 Marionette TRACE conn7 <- [1,9,null,["13"]]
23:27:20 INFO - PROCESS | 4084 | 1477636040359 Marionette TRACE conn7 -> [0,10,"switchToWindow",{"name":"13"}]
23:27:20 INFO - PROCESS | 4084 | 1477636040365 Marionette TRACE conn7 <- [1,10,null,{}]
23:27:20 INFO - PROCESS | 4084 | 1477636040369 Marionette TRACE conn7 -> [0,11,"executeAsyncScript",{"scriptTimeout":null,"sandbox":"default","debug_script":false,"script":"/* This Source Code Form is subject to the terms of the Mozilla Public\n * License, v. 2.0. If a copy of the MPL was not distributed with this\n * file, You can obtain one at http://mozilla.org/MPL/2.0/. */\n\nwindow.wrappedJSObject.timeout_multiplier = 3;\nwindow.wrappedJSObject.explicit_timeout = 0;\n\nwindow.wrappedJSObject.addEventListener(\"message\", function listener(event) {\n if (event.data.type != \"complete\") {\n return;\n }\n window.wrappedJSObject.removeEventListener(\"message\", listener);\n clearTimeout(timer);\n var tests = event.data.tests;\n var status = event.data.status;\n\n var subtest_results = tests.map(function(x) {\n return [x.name, x.status, x.message, x.stack]\n });\n\n marionetteScriptFinished([\"/2dcontext/image-smoothing/imagesmoothing.html\",\n status.status,\n status.message,\n status.stack,\n subtest_results]);\n}, false);\n\nwindow.wrappedJSObject.win = window.open(\"http://web-platform.test:8000/2dcontext/image-smoothing/imagesmoothing.html\", \"9263aebf-3e6f-41f6-9f2e-cdafea6cd8db\");\n\nvar timer = null;\nif (30000) {\n timer = setTimeout(function() {\n log(\"Timeout fired\");\n window.wrappedJSObject.win.timeout();\n }, 30000);\n}\n","newSandbox":false,"line":445,"args":[],"filename":"executormarionette.py"}]
23:27:20 INFO - PROCESS | 4084 | ++DOCSHELL 0000007606D56800 == 7 [pid = 4084] [id = 8]
23:27:20 INFO - PROCESS | 4084 | ++DOMWINDOW == 20 (0000007606D57000) [pid = 4084] [serial = 20] [outer = 0000000000000000]
23:27:20 INFO - PROCESS | 4084 | ++DOMWINDOW == 21 (0000007607007000) [pid = 4084] [serial = 21] [outer = 0000007606D57000]
23:27:20 INFO - PROCESS | 4084 | 1477636040484 Marionette DEBUG loaded listener.js
23:27:20 INFO - PROCESS | 4084 | ++DOMWINDOW == 22 (0000007607009000) [pid = 4084] [serial = 22] [outer = 0000007606D57000]
23:27:20 INFO - PROCESS | 4084 | ++DOCSHELL 0000007608A2C000 == 8 [pid = 4084] [id = 9]
23:27:20 INFO - PROCESS | 4084 | ++DOMWINDOW == 23 (0000007608F9B800) [pid = 4084] [serial = 23] [outer = 0000000000000000]
23:27:20 INFO - PROCESS | 4084 | ++DOMWINDOW == 24 (0000007608FA5800) [pid = 4084] [serial = 24] [outer = 0000007608F9B800]
23:27:20 INFO - PROCESS | 4084 | 1477636040813 Marionette DEBUG loaded listener.js
23:27:20 INFO - PROCESS | 4084 | ++DOMWINDOW == 25 (0000007609EA0800) [pid = 4084] [serial = 25] [outer = 0000007608F9B800]
23:27:21 INFO - PROCESS | 4084 | 1477636041227 Marionette TRACE conn7 <- [1,11,null,{"value":["/2dcontext/image-smoothing/imagesmoothing.html",0,null,null,[["When the canvas context is created, imageSmoothingEnabled must be set to true.",0,null,null],["On getting imageSmoothingEnabled, the user agent must return the last value it was set to.",0,null,null],["Test that image smoothing is actually on by default and just the attribute value.",0,null,null],["Test that image smoothing works when imageSmoothingEnabled is set to true",0,null,null],["Test that imageSmoothingEnabled = false (nearest-neighbor interpolation) works with drawImage().",0,null,null],["Test that imageSmoothingEnabled = false (nearest-neighbor interpolation) works with fillRect and createPattern().",0,null,null],["Test that imageSmoothingEnabled = false (nearest-neighbor interpolation) works with fill() and createPattern().",0,null,null],["Test that imageSmoothingEnabled = false (nearest-neighbor interpolation) works with stroke() and createPattern().",0,null,null],["Test that imageSmoothingEnabled = false (nearest-neighbor interpolation) still works after repaints.",0,null,null]]]}]
23:27:21 INFO - .........
23:27:21 INFO - TEST-OK | /2dcontext/image-smoothing/imagesmoothing.html | took 986ms
23:27:21 INFO - PROCESS | 4084 | 1477636041424 Marionette TRACE conn7 -> [0,12,"getWindowHandle",null]
23:27:21 INFO - PROCESS | 4084 | 1477636041429 Marionette TRACE conn7 <- [1,12,null,{"value":"13"}]
23:27:21 INFO - TEST-START | /WebCryptoAPI/derive_bits_keys/ecdh_bits.worker
23:27:21 INFO - PROCESS | 4084 | 1477636041636 Marionette TRACE conn7 -> [0,13,"executeScript",{"scriptTimeout":null,"newSandbox":true,"args":[],"filename":"executormarionette.py","script":"if (window.wrappedJSObject.win) {window.wrappedJSObject.win.close()}","sandbox":"default","line":430}]
23:27:21 INFO - PROCESS | 4084 | 1477636041811 Marionette TRACE conn7 <- [1,13,null,{"value":null}]
23:27:21 INFO - PROCESS | 4084 | 1477636041838 Marionette TRACE conn7 -> [0,14,"getWindowHandles",null]
23:27:21 INFO - PROCESS | 4084 | 1477636041842 Marionette TRACE conn7 <- [1,14,null,["13"]]
23:27:21 INFO - PROCESS | 4084 | 1477636041846 Marionette TRACE conn7 -> [0,15,"switchToWindow",{"name":"13"}]
23:27:21 INFO - PROCESS | 4084 | 1477636041851 Marionette TRACE conn7 <- [1,15,null,{}]
23:27:21 INFO - PROCESS | 4084 | 1477636041856 Marionette TRACE conn7 -> [0,16,"executeAsyncScript",{"scriptTimeout":null,"sandbox":"default","debug_script":false,"script":"/* This Source Code Form is subject to the terms of the Mozilla Public\n * License, v. 2.0. If a copy of the MPL was not distributed with this\n * file, You can obtain one at http://mozilla.org/MPL/2.0/. */\n\nwindow.wrappedJSObject.timeout_multiplier = 3;\nwindow.wrappedJSObject.explicit_timeout = 0;\n\nwindow.wrappedJSObject.addEventListener(\"message\", function listener(event) {\n if (event.data.type != \"complete\") {\n return;\n }\n window.wrappedJSObject.removeEventListener(\"message\", listener);\n clearTimeout(timer);\n var tests = event.data.tests;\n var status = event.data.status;\n\n var subtest_results = tests.map(function(x) {\n return [x.name, x.status, x.message, x.stack]\n });\n\n marionetteScriptFinished([\"/WebCryptoAPI/derive_bits_keys/ecdh_bits.worker\",\n status.status,\n status.message,\n status.stack,\n subtest_results]);\n}, false);\n\nwindow.wrappedJSObject.win = window.open(\"http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/ecdh_bits.worker\", \"9263aebf-3e6f-41f6-9f2e-cdafea6cd8db\");\n\nvar timer = null;\nif (30000) {\n timer = setTimeout(function() {\n log(\"Timeout fired\");\n window.wrappedJSObject.win.timeout();\n }, 30000);\n}\n","newSandbox":false,"line":445,"args":[],"filename":"executormarionette.py"}]
23:27:21 INFO - PROCESS | 4084 | ++DOCSHELL 0000007607542800 == 9 [pid = 4084] [id = 10]
23:27:21 INFO - PROCESS | 4084 | ++DOMWINDOW == 26 (0000007607898800) [pid = 4084] [serial = 26] [outer = 0000000000000000]
23:27:21 INFO - PROCESS | 4084 | ++DOMWINDOW == 27 (00000076078AE000) [pid = 4084] [serial = 27] [outer = 0000007607898800]
23:27:21 INFO - PROCESS | 4084 | 1477636041916 Marionette DEBUG loaded listener.js
23:27:22 INFO - PROCESS | 4084 | ++DOMWINDOW == 28 (0000007608955000) [pid = 4084] [serial = 28] [outer = 0000007607898800]
23:27:22 INFO - PROCESS | 4084 | [4084] WARNING: Failed to retarget HTML data delivery to the parser thread.: file c:/builds/moz2_slave/fx-team-w64-d-0000000000000000/build/src/parser/html/nsHtml5StreamParser.cpp, line 970
23:27:22 INFO - PROCESS | 4084 | --DOCSHELL 0000007600524800 == 8 [pid = 4084] [id = 4]
23:27:22 INFO - PROCESS | 4084 | ++DOCSHELL 0000007605615800 == 9 [pid = 4084] [id = 11]
23:27:22 INFO - PROCESS | 4084 | ++DOMWINDOW == 29 (000000760561C000) [pid = 4084] [serial = 29] [outer = 0000000000000000]
23:27:22 INFO - PROCESS | 4084 | ++DOMWINDOW == 30 (000000760561E000) [pid = 4084] [serial = 30] [outer = 000000760561C000]
23:27:22 INFO - PROCESS | 4084 | ++DOMWINDOW == 31 (00000076062A7800) [pid = 4084] [serial = 31] [outer = 000000760561C000]
23:27:22 INFO - PROCESS | 4084 | ++DOCSHELL 0000007604DEA000 == 10 [pid = 4084] [id = 12]
23:27:22 INFO - PROCESS | 4084 | ++DOMWINDOW == 32 (0000007606D53000) [pid = 4084] [serial = 32] [outer = 0000000000000000]
23:27:22 INFO - PROCESS | 4084 | ++DOMWINDOW == 33 (0000007608A25000) [pid = 4084] [serial = 33] [outer = 0000007606D53000]
23:27:22 INFO - PROCESS | 4084 | ++DOMWINDOW == 34 (0000007609E96800) [pid = 4084] [serial = 34] [outer = 0000007606D53000]
23:27:29 INFO - PROCESS | 4084 | --DOMWINDOW == 33 (0000007600526800) [pid = 4084] [serial = 8] [outer = 0000000000000000] [url = chrome://gfxsanity/content/sanitytest.html]
23:27:29 INFO - PROCESS | 4084 | --DOMWINDOW == 32 (0000007678E88000) [pid = 4084] [serial = 1] [outer = 0000000000000000] [url = chrome://gfxsanity/content/sanityparent.html]
23:27:33 INFO - PROCESS | 4084 | --DOCSHELL 0000007606D56800 == 9 [pid = 4084] [id = 8]
23:27:33 INFO - PROCESS | 4084 | --DOMWINDOW == 31 (0000007607009800) [pid = 4084] [serial = 14] [outer = 0000000000000000] [url = about:blank]
23:27:33 INFO - PROCESS | 4084 | --DOMWINDOW == 30 (0000007600538000) [pid = 4084] [serial = 9] [outer = 0000000000000000] [url = about:blank]
23:27:33 INFO - PROCESS | 4084 | --DOMWINDOW == 29 (0000007602B13000) [pid = 4084] [serial = 10] [outer = 0000000000000000] [url = chrome://gfxsanity/content/sanitytest.html]
23:27:33 INFO - PROCESS | 4084 | --DOMWINDOW == 28 (0000007678E89000) [pid = 4084] [serial = 2] [outer = 0000000000000000] [url = about:blank]
23:27:33 INFO - PROCESS | 4084 | --DOMWINDOW == 27 (000000767E038000) [pid = 4084] [serial = 4] [outer = 0000000000000000] [url = about:blank]
23:27:33 INFO - PROCESS | 4084 | --DOMWINDOW == 26 (0000007608A25000) [pid = 4084] [serial = 33] [outer = 0000000000000000] [url = about:blank]
23:27:33 INFO - PROCESS | 4084 | --DOMWINDOW == 25 (0000007607522000) [pid = 4084] [serial = 17] [outer = 0000000000000000] [url = about:blank]
23:27:33 INFO - PROCESS | 4084 | --DOMWINDOW == 24 (0000007608FA5800) [pid = 4084] [serial = 24] [outer = 0000000000000000] [url = about:blank]
23:27:33 INFO - PROCESS | 4084 | --DOMWINDOW == 23 (000000760561E000) [pid = 4084] [serial = 30] [outer = 0000000000000000] [url = about:blank]
23:27:33 INFO - PROCESS | 4084 | --DOMWINDOW == 22 (0000007607007000) [pid = 4084] [serial = 21] [outer = 0000000000000000] [url = about:blank]
23:27:33 INFO - PROCESS | 4084 | --DOMWINDOW == 21 (00000076078AE000) [pid = 4084] [serial = 27] [outer = 0000000000000000] [url = about:blank]
23:27:35 INFO - PROCESS | 4084 | --DOMWINDOW == 20 (0000007606D57000) [pid = 4084] [serial = 20] [outer = 0000000000000000] [url = http://web-platform.test:8000/2dcontext/image-smoothing/imagesmoothing.html]
23:27:40 INFO - PROCESS | 4084 | --DOMWINDOW == 19 (0000007607009000) [pid = 4084] [serial = 22] [outer = 0000000000000000] [url = about:blank]
23:27:52 INFO - PROCESS | 4084 | MARIONETTE LOG: INFO: Timeout fired
23:27:52 INFO - PROCESS | 4084 | 1477636072086 Marionette TRACE conn7 <- [1,16,null,{"value":["/WebCryptoAPI/derive_bits_keys/ecdh_bits.worker",2,null,null,[]]}]
23:27:52 INFO - TEST-TIMEOUT | /WebCryptoAPI/derive_bits_keys/ecdh_bits.worker | took 30659ms
23:27:52 INFO - PROCESS | 4084 | 1477636072107 Marionette TRACE conn7 -> [0,17,"getWindowHandle",null]
23:27:52 INFO - PROCESS | 4084 | 1477636072112 Marionette TRACE conn7 <- [1,17,null,{"value":"13"}]
23:27:52 INFO - TEST-START | /WebCryptoAPI/derive_bits_keys/ecdh_keys.worker
23:27:52 INFO - PROCESS | 4084 | 1477636072120 Marionette TRACE conn7 -> [0,18,"executeScript",{"scriptTimeout":null,"newSandbox":true,"args":[],"filename":"executormarionette.py","script":"if (window.wrappedJSObject.win) {window.wrappedJSObject.win.close()}","sandbox":"default","line":430}]
23:27:52 INFO - PROCESS | 4084 | 1477636072251 Marionette TRACE conn7 <- [1,18,null,{"value":null}]
23:27:52 INFO - PROCESS | 4084 | 1477636072280 Marionette TRACE conn7 -> [0,19,"getWindowHandles",null]
23:27:52 INFO - PROCESS | 4084 | 1477636072284 Marionette TRACE conn7 <- [1,19,null,["13"]]
23:27:52 INFO - PROCESS | 4084 | 1477636072289 Marionette TRACE conn7 -> [0,20,"switchToWindow",{"name":"13"}]
23:27:52 INFO - PROCESS | 4084 | 1477636072295 Marionette TRACE conn7 <- [1,20,null,{}]
23:27:52 INFO - PROCESS | 4084 | 1477636072301 Marionette TRACE conn7 -> [0,21,"executeAsyncScript",{"scriptTimeout":null,"sandbox":"default","debug_script":false,"script":"/* This Source Code Form is subject to the terms of the Mozilla Public\n * License, v. 2.0. If a copy of the MPL was not distributed with this\n * file, You can obtain one at http://mozilla.org/MPL/2.0/. */\n\nwindow.wrappedJSObject.timeout_multiplier = 3;\nwindow.wrappedJSObject.explicit_timeout = 0;\n\nwindow.wrappedJSObject.addEventListener(\"message\", function listener(event) {\n if (event.data.type != \"complete\") {\n return;\n }\n window.wrappedJSObject.removeEventListener(\"message\", listener);\n clearTimeout(timer);\n var tests = event.data.tests;\n var status = event.data.status;\n\n var subtest_results = tests.map(function(x) {\n return [x.name, x.status, x.message, x.stack]\n });\n\n marionetteScriptFinished([\"/WebCryptoAPI/derive_bits_keys/ecdh_keys.worker\",\n status.status,\n status.message,\n status.stack,\n subtest_results]);\n}, false);\n\nwindow.wrappedJSObject.win = window.open(\"http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/ecdh_keys.worker\", \"9263aebf-3e6f-41f6-9f2e-cdafea6cd8db\");\n\nvar timer = null;\nif (30000) {\n timer = setTimeout(function() {\n log(\"Timeout fired\");\n window.wrappedJSObject.win.timeout();\n }, 30000);\n}\n","newSandbox":false,"line":445,"args":[],"filename":"executormarionette.py"}]
23:27:52 INFO - PROCESS | 4084 | ++DOCSHELL 0000007604DE5800 == 10 [pid = 4084] [id = 13]
23:27:52 INFO - PROCESS | 4084 | ++DOMWINDOW == 20 (0000007604DEB000) [pid = 4084] [serial = 35] [outer = 0000000000000000]
23:27:52 INFO - PROCESS | 4084 | ++DOMWINDOW == 21 (0000007604DF6800) [pid = 4084] [serial = 36] [outer = 0000007604DEB000]
23:27:52 INFO - PROCESS | 4084 | 1477636072383 Marionette DEBUG loaded listener.js
23:27:52 INFO - PROCESS | 4084 | ++DOMWINDOW == 22 (0000007605B14000) [pid = 4084] [serial = 37] [outer = 0000007604DEB000]
23:27:52 INFO - PROCESS | 4084 | [4084] WARNING: Failed to retarget HTML data delivery to the parser thread.: file c:/builds/moz2_slave/fx-team-w64-d-0000000000000000/build/src/parser/html/nsHtml5StreamParser.cpp, line 970
23:27:52 INFO - PROCESS | 4084 | ++DOMWINDOW == 23 (0000007606959000) [pid = 4084] [serial = 38] [outer = 0000007606D53000]
23:28:01 INFO - PROCESS | 4084 | --DOCSHELL 0000007607542800 == 9 [pid = 4084] [id = 10]
23:28:03 INFO - PROCESS | 4084 | --DOMWINDOW == 22 (0000007607898800) [pid = 4084] [serial = 26] [outer = 0000000000000000] [url = http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/ecdh_bits.worker]
23:28:08 INFO - PROCESS | 4084 | --DOMWINDOW == 21 (0000007604DF6800) [pid = 4084] [serial = 36] [outer = 0000000000000000] [url = about:blank]
23:28:08 INFO - PROCESS | 4084 | --DOMWINDOW == 20 (0000007609E96800) [pid = 4084] [serial = 34] [outer = 0000000000000000] [url = about:neterror?e=dnsNotFound&u=https%3A//%25%28server%29s/selfsupport-dummy/&c=UTF-8&f=regular&d=Firefox%20can%E2%80%99t%20find%20the%20server%20at%20%25%28server%29s.]
23:28:08 INFO - PROCESS | 4084 | --DOMWINDOW == 19 (0000007608955000) [pid = 4084] [serial = 28] [outer = 0000000000000000] [url = about:blank]
23:28:16 INFO - PROCESS | 4084 | 1477636096625 addons.productaddons WARN Failed downloading XML, status: 0, reason: error
23:28:22 INFO - PROCESS | 4084 | MARIONETTE LOG: INFO: Timeout fired
23:28:22 INFO - PROCESS | 4084 | 1477636102575 Marionette TRACE conn7 <- [1,21,null,{"value":["/WebCryptoAPI/derive_bits_keys/ecdh_keys.worker",2,null,null,[]]}]
23:28:22 INFO - TEST-TIMEOUT | /WebCryptoAPI/derive_bits_keys/ecdh_keys.worker | took 30483ms
23:28:22 INFO - PROCESS | 4084 | 1477636102605 Marionette TRACE conn7 -> [0,22,"getWindowHandle",null]
23:28:22 INFO - PROCESS | 4084 | 1477636102609 Marionette TRACE conn7 <- [1,22,null,{"value":"13"}]
23:28:22 INFO - TEST-START | /WebCryptoAPI/derive_bits_keys/hkdf.worker
23:28:22 INFO - PROCESS | 4084 | 1477636102645 Marionette TRACE conn7 -> [0,23,"executeScript",{"scriptTimeout":null,"newSandbox":true,"args":[],"filename":"executormarionette.py","script":"if (window.wrappedJSObject.win) {window.wrappedJSObject.win.close()}","sandbox":"default","line":430}]
23:28:22 INFO - PROCESS | 4084 | 1477636102753 Marionette TRACE conn7 <- [1,23,null,{"value":null}]
23:28:22 INFO - PROCESS | 4084 | 1477636102759 Marionette TRACE conn7 -> [0,24,"getWindowHandles",null]
23:28:22 INFO - PROCESS | 4084 | 1477636102762 Marionette TRACE conn7 <- [1,24,null,["13"]]
23:28:22 INFO - PROCESS | 4084 | 1477636102769 Marionette TRACE conn7 -> [0,25,"switchToWindow",{"name":"13"}]
23:28:22 INFO - PROCESS | 4084 | 1477636102773 Marionette TRACE conn7 <- [1,25,null,{}]
23:28:22 INFO - PROCESS | 4084 | 1477636102779 Marionette TRACE conn7 -> [0,26,"executeAsyncScript",{"scriptTimeout":null,"sandbox":"default","debug_script":false,"script":"/* This Source Code Form is subject to the terms of the Mozilla Public\n * License, v. 2.0. If a copy of the MPL was not distributed with this\n * file, You can obtain one at http://mozilla.org/MPL/2.0/. */\n\nwindow.wrappedJSObject.timeout_multiplier = 3;\nwindow.wrappedJSObject.explicit_timeout = 0;\n\nwindow.wrappedJSObject.addEventListener(\"message\", function listener(event) {\n if (event.data.type != \"complete\") {\n return;\n }\n window.wrappedJSObject.removeEventListener(\"message\", listener);\n clearTimeout(timer);\n var tests = event.data.tests;\n var status = event.data.status;\n\n var subtest_results = tests.map(function(x) {\n return [x.name, x.status, x.message, x.stack]\n });\n\n marionetteScriptFinished([\"/WebCryptoAPI/derive_bits_keys/hkdf.worker\",\n status.status,\n status.message,\n status.stack,\n subtest_results]);\n}, false);\n\nwindow.wrappedJSObject.win = window.open(\"http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker\", \"9263aebf-3e6f-41f6-9f2e-cdafea6cd8db\");\n\nvar timer = null;\nif (30000) {\n timer = setTimeout(function() {\n log(\"Timeout fired\");\n window.wrappedJSObject.win.timeout();\n }, 30000);\n}\n","newSandbox":false,"line":445,"args":[],"filename":"executormarionette.py"}]
23:28:22 INFO - PROCESS | 4084 | ++DOCSHELL 00000076062B1000 == 10 [pid = 4084] [id = 14]
23:28:22 INFO - PROCESS | 4084 | ++DOMWINDOW == 20 (00000076062B3800) [pid = 4084] [serial = 39] [outer = 0000000000000000]
23:28:22 INFO - PROCESS | 4084 | ++DOMWINDOW == 21 (00000076068B0000) [pid = 4084] [serial = 40] [outer = 00000076062B3800]
23:28:22 INFO - PROCESS | 4084 | 1477636102839 Marionette DEBUG loaded listener.js
23:28:22 INFO - PROCESS | 4084 | ++DOMWINDOW == 22 (0000007606D45000) [pid = 4084] [serial = 41] [outer = 00000076062B3800]
23:28:23 INFO - PROCESS | 4084 | [4084] WARNING: Failed to retarget HTML data delivery to the parser thread.: file c:/builds/moz2_slave/fx-team-w64-d-0000000000000000/build/src/parser/html/nsHtml5StreamParser.cpp, line 970
23:28:37 INFO - PROCESS | 4084 | 1477636115805 Marionette TRACE conn7 <- [1,26,null,{"value":["/WebCryptoAPI/derive_bits_keys/hkdf.worker",0,null,null,[["short derivedKey, normal salt, SHA-384, with normal info",0,{},{}],["short derivedKey, normal salt, SHA-384, with normal info with 0 length",1,"assert_equals: deriveBits with 0 length correctly threw OperationError: Data provided to an operation does not meet requirements expected \"OperationError\" but got \"DataError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:54:33\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:50:36\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:49:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-CBC length: 128 using short derivedKey, normal salt, SHA-384, with normal info",0,{},{}],["Derived key of type name: AES-CBC length: 128 using short derivedKey, normal salt, SHA-384, with normal info with bad hash name SHA384",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-CBC length: 128 using short derivedKey, normal salt, SHA-384, with normal info with missing deriveKey usage",0,{},{}],["Derived key of type name: AES-CBC length: 128 using short derivedKey, normal salt, SHA-384, with normal info with wrong (ECDH) key",0,{},{}],["Derived key of type name: AES-CBC length: 192 using short derivedKey, normal salt, SHA-384, with normal info",0,{},{}],["Derived key of type name: AES-CBC length: 192 using short derivedKey, normal salt, SHA-384, with normal info with bad hash name SHA384",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-CBC length: 192 using short derivedKey, normal salt, SHA-384, with normal info with missing deriveKey usage",0,{},{}],["Derived key of type name: AES-CBC length: 192 using short derivedKey, normal salt, SHA-384, with normal info with wrong (ECDH) key",0,{},{}],["Derived key of type name: AES-CBC length: 256 using short derivedKey, normal salt, SHA-384, with normal info",0,{},{}],["Derived key of type name: AES-CBC length: 256 using short derivedKey, normal salt, SHA-384, with normal info with bad hash name SHA384",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-CBC length: 256 using short derivedKey, normal salt, SHA-384, with normal info with missing deriveKey usage",0,{},{}],["Derived key of type name: AES-CBC length: 256 using short derivedKey, normal salt, SHA-384, with normal info with wrong (ECDH) key",0,{},{}],["Derived key of type name: AES-CTR length: 128 using short derivedKey, normal salt, SHA-384, with normal info",0,{},{}],["Derived key of type name: AES-CTR length: 128 using short derivedKey, normal salt, SHA-384, with normal info with bad hash name SHA384",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-CTR length: 128 using short derivedKey, normal salt, SHA-384, with normal info with missing deriveKey usage",0,{},{}],["Derived key of type name: AES-CTR length: 128 using short derivedKey, normal salt, SHA-384, with normal info with wrong (ECDH) key",0,{},{}],["Derived key of type name: AES-CTR length: 192 using short derivedKey, normal salt, SHA-384, with normal info",0,{},{}],["Derived key of type name: AES-CTR length: 192 using short derivedKey, normal salt, SHA-384, with normal info with bad hash name SHA384",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-CTR length: 192 using short derivedKey, normal salt, SHA-384, with normal info with missing deriveKey usage",0,{},{}],["Derived key of type name: AES-CTR length: 192 using short derivedKey, normal salt, SHA-384, with normal info with wrong (ECDH) key",0,{},{}],["Derived key of type name: AES-CTR length: 256 using short derivedKey, normal salt, SHA-384, with normal info",0,{},{}],["Derived key of type name: AES-CTR length: 256 using short derivedKey, normal salt, SHA-384, with normal info with bad hash name SHA384",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-CTR length: 256 using short derivedKey, normal salt, SHA-384, with normal info with missing deriveKey usage",0,{},{}],["Derived key of type name: AES-CTR length: 256 using short derivedKey, normal salt, SHA-384, with normal info with wrong (ECDH) key",0,{},{}],["Derived key of type name: AES-GCM length: 128 using short derivedKey, normal salt, SHA-384, with normal info",0,{},{}],["Derived key of type name: AES-GCM length: 128 using short derivedKey, normal salt, SHA-384, with normal info with bad hash name SHA384",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-GCM length: 128 using short derivedKey, normal salt, SHA-384, with normal info with missing deriveKey usage",0,{},{}],["Derived key of type name: AES-GCM length: 128 using short derivedKey, normal salt, SHA-384, with normal info with wrong (ECDH) key",0,{},{}],["Derived key of type name: AES-GCM length: 192 using short derivedKey, normal salt, SHA-384, with normal info",0,{},{}],["Derived key of type name: AES-GCM length: 192 using short derivedKey, normal salt, SHA-384, with normal info with bad hash name SHA384",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-GCM length: 192 using short derivedKey, normal salt, SHA-384, with normal info with missing deriveKey usage",0,{},{}],["Derived key of type name: AES-GCM length: 192 using short derivedKey, normal salt, SHA-384, with normal info with wrong (ECDH) key",0,{},{}],["Derived key of type name: AES-GCM length: 256 using short derivedKey, normal salt, SHA-384, with normal info",0,{},{}],["Derived key of type name: AES-GCM length: 256 using short derivedKey, normal salt, SHA-384, with normal info with bad hash name SHA384",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-GCM length: 256 using short derivedKey, normal salt, SHA-384, with normal info with missing deriveKey usage",0,{},{}],["Derived key of type name: AES-GCM length: 256 using short derivedKey, normal salt, SHA-384, with normal info with wrong (ECDH) key",0,{},{}],["Derived key of type name: AES-KW length: 128 using short derivedKey, normal salt, SHA-384, with normal info",0,{},{}],["Derived key of type name: AES-KW length: 128 using short derivedKey, normal salt, SHA-384, with normal info with bad hash name SHA384",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-KW length: 128 using short derivedKey, normal salt, SHA-384, with normal info with missing deriveKey usage",0,{},{}],["Derived key of type name: AES-KW length: 128 using short derivedKey, normal salt, SHA-384, with normal info with wrong (ECDH) key",0,{},{}],["Derived key of type name: AES-KW length: 192 using short derivedKey, normal salt, SHA-384, with normal info",0,{},{}],["Derived key of type name: AES-KW length: 192 using short derivedKey, normal salt, SHA-384, with normal info with bad hash name SHA384",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-KW length: 192 using short derivedKey, normal salt, SHA-384, with normal info with missing deriveKey usage",0,{},{}],["Derived key of type name: AES-KW length: 192 using short derivedKey, normal salt, SHA-384, with normal info with wrong (ECDH) key",0,{},{}],["Derived key of type name: AES-KW length: 256 using short derivedKey, normal salt, SHA-384, with normal info",0,{},{}],["Derived key of type name: AES-KW length: 256 using short derivedKey, normal salt, SHA-384, with normal info with bad hash name SHA384",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-KW length: 256 using short derivedKey, normal salt, SHA-384, with normal info with missing deriveKey usage",0,{},{}],["Derived key of type name: AES-KW length: 256 using short derivedKey, normal salt, SHA-384, with normal info with wrong (ECDH) key",0,{},{}],["Derived key of type name: HMAC hash: SHA-1 length: 256 using short derivedKey, normal salt, SHA-384, with normal info",0,{},{}],["Derived key of type name: HMAC hash: SHA-1 length: 256 using short derivedKey, normal salt, SHA-384, with normal info with bad hash name SHA384",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: HMAC hash: SHA-1 length: 256 using short derivedKey, normal salt, SHA-384, with normal info with missing deriveKey usage",0,{},{}],["Derived key of type name: HMAC hash: SHA-1 length: 256 using short derivedKey, normal salt, SHA-384, with normal info with wrong (ECDH) key",0,{},{}],["Derived key of type name: HMAC hash: SHA-256 length: 256 using short derivedKey, normal salt, SHA-384, with normal info",0,{},{}],["Derived key of type name: HMAC hash: SHA-256 length: 256 using short derivedKey, normal salt, SHA-384, with normal info with bad hash name SHA384",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: HMAC hash: SHA-256 length: 256 using short derivedKey, normal salt, SHA-384, with normal info with missing deriveKey usage",0,{},{}],["Derived key of type name: HMAC hash: SHA-256 length: 256 using short derivedKey, normal salt, SHA-384, with normal info with wrong (ECDH) key",0,{},{}],["Derived key of type name: HMAC hash: SHA-384 length: 256 using short derivedKey, normal salt, SHA-384, with normal info",0,{},{}],["Derived key of type name: HMAC hash: SHA-384 length: 256 using short derivedKey, normal salt, SHA-384, with normal info with bad hash name SHA384",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: HMAC hash: SHA-384 length: 256 using short derivedKey, normal salt, SHA-384, with normal info with missing deriveKey usage",0,{},{}],["Derived key of type name: HMAC hash: SHA-384 length: 256 using short derivedKey, normal salt, SHA-384, with normal info with wrong (ECDH) key",0,{},{}],["Derived key of type name: HMAC hash: SHA-512 length: 256 using short derivedKey, normal salt, SHA-384, with normal info",0,{},{}],["Derived key of type name: HMAC hash: SHA-512 length: 256 using short derivedKey, normal salt, SHA-384, with normal info with bad hash name SHA384",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: HMAC hash: SHA-512 length: 256 using short derivedKey, normal salt, SHA-384, with normal info with missing deriveKey usage",0,{},{}],["Derived key of type name: HMAC hash: SHA-512 length: 256 using short derivedKey, normal salt, SHA-384, with normal info with wrong (ECDH) key",0,{},{}],["short derivedKey, normal salt, SHA-384, with normal info with missing salt",1,"assert_equals: deriveBits missing salt correctly threw OperationError: An invalid or illegal string was specified expected \"TypeError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:128:33\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:124:36\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:123:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["short derivedKey, normal salt, SHA-384, with normal info with missing info",1,"assert_equals: deriveBits missing info correctly threw OperationError: An invalid or illegal string was specified expected \"TypeError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:138:33\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:134:36\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:133:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["short derivedKey, normal salt, SHA-384, with normal info with null length",1,"assert_equals: deriveBits with null length correctly threw OperationError: Data provided to an operation does not meet requirements expected \"TypeError\" but got \"DataError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:148:33\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:144:36\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:143:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["short derivedKey, normal salt, SHA-384, with normal info with non-multiple of 8 length",1,"assert_unreached: non-multiple of 8 length should have thrown an OperationError Reached unreachable code","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:156:33\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:154:36\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:153:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["short derivedKey, normal salt, SHA-384, with normal info with bad hash name SHA384",1,"assert_equals: deriveBits with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:170:33\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:166:36\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:164:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["short derivedKey, normal salt, SHA-384, with normal info with missing deriveBits usage",0,{},{}],["short derivedKey, normal salt, SHA-384, with normal info with wrong (ECDH) key",0,{},{}],["short derivedKey, normal salt, SHA-384, with empty info",0,{},{}],["short derivedKey, normal salt, SHA-384, with empty info with 0 length",1,"assert_equals: deriveBits with 0 length correctly threw OperationError: Data provided to an operation does not meet requirements expected \"OperationError\" but got \"DataError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:54:33\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:50:36\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:49:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-CBC length: 128 using short derivedKey, normal salt, SHA-384, with empty info",0,{},{}],["Derived key of type name: AES-CBC length: 128 using short derivedKey, normal salt, SHA-384, with empty info with bad hash name SHA384",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-CBC length: 128 using short derivedKey, normal salt, SHA-384, with empty info with missing deriveKey usage",0,{},{}],["Derived key of type name: AES-CBC length: 128 using short derivedKey, normal salt, SHA-384, with empty info with wrong (ECDH) key",0,{},{}],["Derived key of type name: AES-CBC length: 192 using short derivedKey, normal salt, SHA-384, with empty info",0,{},{}],["Derived key of type name: AES-CBC length: 192 using short derivedKey, normal salt, SHA-384, with empty info with bad hash name SHA384",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-CBC length: 192 using short derivedKey, normal salt, SHA-384, with empty info with missing deriveKey usage",0,{},{}],["Derived key of type name: AES-CBC length: 192 using short derivedKey, normal salt, SHA-384, with empty info with wrong (ECDH) key",0,{},{}],["Derived key of type name: AES-CBC length: 256 using short derivedKey, normal salt, SHA-384, with empty info",0,{},{}],["Derived key of type name: AES-CBC length: 256 using short derivedKey, normal salt, SHA-384, with empty info with bad hash name SHA384",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-CBC length: 256 using short derivedKey, normal salt, SHA-384, with empty info with missing deriveKey usage",0,{},{}],["Derived key of type name: AES-CBC length: 256 using short derivedKey, normal salt, SHA-384, with empty info with wrong (ECDH) key",0,{},{}],["Derived key of type name: AES-CTR length: 128 using short derivedKey, normal salt, SHA-384, with empty info",0,{},{}],["Derived key of type name: AES-CTR length: 128 using short derivedKey, normal salt, SHA-384, with empty info with bad hash name SHA384",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-CTR length: 128 using short derivedKey, normal salt, SHA-384, with empty info with missing deriveKey usage",0,{},{}],["Derived key of type name: AES-CTR length: 128 using short derivedKey, normal salt, SHA-384, with empty info with wrong (ECDH) key",0,{},{}],["Derived key of type name: AES-CTR length: 192 using short derivedKey, normal salt, SHA-384, with empty info",0,{},{}],["Derived key of type name: AES-CTR length: 192 using short derivedKey, normal salt, SHA-384, with empty info with bad hash name SHA384",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-CTR length: 192 using short derivedKey, normal salt, SHA-384, with empty info with missing deriveKey usage",0,{},{}],["Derived key of type name: AES-CTR length: 192 using short derivedKey, normal salt, SHA-384, with empty info with wrong (ECDH) key",0,{},{}],["Derived key of type name: AES-CTR length: 256 using short derivedKey, normal salt, SHA-384, with empty info",0,{},{}],["Derived key of type name: AES-CTR length: 256 using short derivedKey, normal salt, SHA-384, with empty info with bad hash name SHA384",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-CTR length: 256 using short derivedKey, normal salt, SHA-384, with empty info with missing deriveKey usage",0,{},{}],["Derived key of type name: AES-CTR length: 256 using short derivedKey, normal salt, SHA-384, with empty info with wrong (ECDH) key",0,{},{}],["Derived key of type name: AES-GCM length: 128 using short derivedKey, normal salt, SHA-384, with empty info",0,{},{}],["Derived key of type name: AES-GCM length: 128 using short derivedKey, normal salt, SHA-384, with empty info with bad hash name SHA384",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-GCM length: 128 using short derivedKey, normal salt, SHA-384, with empty info with missing deriveKey usage",0,{},{}],["Derived key of type name: AES-GCM length: 128 using short derivedKey, normal salt, SHA-384, with empty info with wrong (ECDH) key",0,{},{}],["Derived key of type name: AES-GCM length: 192 using short derivedKey, normal salt, SHA-384, with empty info",0,{},{}],["Derived key of type name: AES-GCM length: 192 using short derivedKey, normal salt, SHA-384, with empty info with bad hash name SHA384",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-GCM length: 192 using short derivedKey, normal salt, SHA-384, with empty info with missing deriveKey usage",0,{},{}],["Derived key of type name: AES-GCM length: 192 using short derivedKey, normal salt, SHA-384, with empty info with wrong (ECDH) key",0,{},{}],["Derived key of type name: AES-GCM length: 256 using short derivedKey, normal salt, SHA-384, with empty info",0,{},{}],["Derived key of type name: AES-GCM length: 256 using short derivedKey, normal salt, SHA-384, with empty info with bad hash name SHA384",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-GCM length: 256 using short derivedKey, normal salt, SHA-384, with empty info with missing deriveKey usage",0,{},{}],["Derived key of type name: AES-GCM length: 256 using short derivedKey, normal salt, SHA-384, with empty info with wrong (ECDH) key",0,{},{}],["Derived key of type name: AES-KW length: 128 using short derivedKey, normal salt, SHA-384, with empty info",0,{},{}],["Derived key of type name: AES-KW length: 128 using short derivedKey, normal salt, SHA-384, with empty info with bad hash name SHA384",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-KW length: 128 using short derivedKey, normal salt, SHA-384, with empty info with missing deriveKey usage",0,{},{}],["Derived key of type name: AES-KW length: 128 using short derivedKey, normal salt, SHA-384, with empty info with wrong (ECDH) key",0,{},{}],["Derived key of type name: AES-KW length: 192 using short derivedKey, normal salt, SHA-384, with empty info",0,{},{}],["Derived key of type name: AES-KW length: 192 using short derivedKey, normal salt, SHA-384, with empty info with bad hash name SHA384",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-KW length: 192 using short derivedKey, normal salt, SHA-384, with empty info with missing deriveKey usage",0,{},{}],["Derived key of type name: AES-KW length: 192 using short derivedKey, normal salt, SHA-384, with empty info with wrong (ECDH) key",0,{},{}],["Derived key of type name: AES-KW length: 256 using short derivedKey, normal salt, SHA-384, with empty info",0,{},{}],["Derived key of type name: AES-KW length: 256 using short derivedKey, normal salt, SHA-384, with empty info with bad hash name SHA384",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-KW length: 256 using short derivedKey, normal salt, SHA-384, with empty info with missing deriveKey usage",0,{},{}],["Derived key of type name: AES-KW length: 256 using short derivedKey, normal salt, SHA-384, with empty info with wrong (ECDH) key",0,{},{}],["Derived key of type name: HMAC hash: SHA-1 length: 256 using short derivedKey, normal salt, SHA-384, with empty info",0,{},{}],["Derived key of type name: HMAC hash: SHA-1 length: 256 using short derivedKey, normal salt, SHA-384, with empty info with bad hash name SHA384",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: HMAC hash: SHA-1 length: 256 using short derivedKey, normal salt, SHA-384, with empty info with missing deriveKey usage",0,{},{}],["Derived key of type name: HMAC hash: SHA-1 length: 256 using short derivedKey, normal salt, SHA-384, with empty info with wrong (ECDH) key",0,{},{}],["Derived key of type name: HMAC hash: SHA-256 length: 256 using short derivedKey, normal salt, SHA-384, with empty info",0,{},{}],["Derived key of type name: HMAC hash: SHA-256 length: 256 using short derivedKey, normal salt, SHA-384, with empty info with bad hash name SHA384",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: HMAC hash: SHA-256 length: 256 using short derivedKey, normal salt, SHA-384, with empty info with missing deriveKey usage",0,{},{}],["Derived key of type name: HMAC hash: SHA-256 length: 256 using short derivedKey, normal salt, SHA-384, with empty info with wrong (ECDH) key",0,{},{}],["Derived key of type name: HMAC hash: SHA-384 length: 256 using short derivedKey, normal salt, SHA-384, with empty info",0,{},{}],["Derived key of type name: HMAC hash: SHA-384 length: 256 using short derivedKey, normal salt, SHA-384, with empty info with bad hash name SHA384",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: HMAC hash: SHA-384 length: 256 using short derivedKey, normal salt, SHA-384, with empty info with missing deriveKey usage",0,{},{}],["Derived key of type name: HMAC hash: SHA-384 length: 256 using short derivedKey, normal salt, SHA-384, with empty info with wrong (ECDH) key",0,{},{}],["Derived key of type name: HMAC hash: SHA-512 length: 256 using short derivedKey, normal salt, SHA-384, with empty info",0,{},{}],["Derived key of type name: HMAC hash: SHA-512 length: 256 using short derivedKey, normal salt, SHA-384, with empty info with bad hash name SHA384",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: HMAC hash: SHA-512 length: 256 using short derivedKey, normal salt, SHA-384, with empty info with missing deriveKey usage",0,{},{}],["Derived key of type name: HMAC hash: SHA-512 length: 256 using short derivedKey, normal salt, SHA-384, with empty info with wrong (ECDH) key",0,{},{}],["short derivedKey, normal salt, SHA-384, with empty info with missing salt",1,"assert_equals: deriveBits missing salt correctly threw OperationError: An invalid or illegal string was specified expected \"TypeError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:128:33\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:124:36\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:123:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["short derivedKey, normal salt, SHA-384, with empty info with missing info",1,"assert_equals: deriveBits missing info correctly threw OperationError: An invalid or illegal string was specified expected \"TypeError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:138:33\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:134:36\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:133:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["short derivedKey, normal salt, SHA-384, with empty info with null length",1,"assert_equals: deriveBits with null length correctly threw OperationError: Data provided to an operation does not meet requirements expected \"TypeError\" but got \"DataError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:148:33\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:144:36\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:143:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["short derivedKey, normal salt, SHA-384, with empty info with non-multiple of 8 length",1,"assert_unreached: non-multiple of 8 length should have thrown an OperationError Reached unreachable code","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:156:33\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:154:36\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:153:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["short derivedKey, normal salt, SHA-384, with empty info with bad hash name SHA384",1,"assert_equals: deriveBits with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:170:33\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:166:36\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:164:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["short derivedKey, normal salt, SHA-384, with empty info with missing deriveBits usage",0,{},{}],["short derivedKey, normal salt, SHA-384, with empty info with wrong (ECDH) key",0,{},{}],["short derivedKey, normal salt, SHA-512, with normal info",0,{},{}],["short derivedKey, normal salt, SHA-512, with normal info with 0 length",1,"assert_equals: deriveBits with 0 length correctly threw OperationError: Data provided to an operation does not meet requirements expected \"OperationError\" but got \"DataError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:54:33\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:50:36\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:49:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-CBC length: 128 using short derivedKey, normal salt, SHA-512, with normal info",0,{},{}],["Derived key of type name: AES-CBC length: 128 using short derivedKey, normal salt, SHA-512, with normal info with bad hash name SHA512",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-CBC length: 128 using short derivedKey, normal salt, SHA-512, with normal info with missing deriveKey usage",0,{},{}],["Derived key of type name: AES-CBC length: 128 using short derivedKey, normal salt, SHA-512, with normal info with wrong (ECDH) key",0,{},{}],["Derived key of type name: AES-CBC length: 192 using short derivedKey, normal salt, SHA-512, with normal info",0,{},{}],["Derived key of type name: AES-CBC length: 192 using short derivedKey, normal salt, SHA-512, with normal info with bad hash name SHA512",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-CBC length: 192 using short derivedKey, normal salt, SHA-512, with normal info with missing deriveKey usage",0,{},{}],["Derived key of type name: AES-CBC length: 192 using short derivedKey, normal salt, SHA-512, with normal info with wrong (ECDH) key",0,{},{}],["Derived key of type name: AES-CBC length: 256 using short derivedKey, normal salt, SHA-512, with normal info",0,{},{}],["Derived key of type name: AES-CBC length: 256 using short derivedKey, normal salt, SHA-512, with normal info with bad hash name SHA512",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-CBC length: 256 using short derivedKey, normal salt, SHA-512, with normal info with missing deriveKey usage",0,{},{}],["Derived key of type name: AES-CBC length: 256 using short derivedKey, normal salt, SHA-512, with normal info with wrong (ECDH) key",0,{},{}],["Derived key of type name: AES-CTR length: 128 using short derivedKey, normal salt, SHA-512, with normal info",0,{},{}],["Derived key of type name: AES-CTR length: 128 using short derivedKey, normal salt, SHA-512, with normal info with bad hash name SHA512",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-CTR length: 128 using short derivedKey, normal salt, SHA-512, with normal info with missing deriveKey usage",0,{},{}],["Derived key of type name: AES-CTR length: 128 using short derivedKey, normal salt, SHA-512, with normal info with wrong (ECDH) key",0,{},{}],["Derived key of type name: AES-CTR length: 192 using short derivedKey, normal salt, SHA-512, with normal info",0,{},{}],["Derived key of type name: AES-CTR length: 192 using short derivedKey, normal salt, SHA-512, with normal info with bad hash name SHA512",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-CTR length: 192 using short derivedKey, normal salt, SHA-512, with normal info with missing deriveKey usage",0,{},{}],["Derived key of type name: AES-CTR length: 192 using short derivedKey, normal salt, SHA-512, with normal info with wrong (ECDH) key",0,{},{}],["Derived key of type name: AES-CTR length: 256 using short derivedKey, normal salt, SHA-512, with normal info",0,{},{}],["Derived key of type name: AES-CTR length: 256 using short derivedKey, normal salt, SHA-512, with normal info with bad hash name SHA512",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-CTR length: 256 using short derivedKey, normal salt, SHA-512, with normal info with missing deriveKey usage",0,{},{}],["Derived key of type name: AES-CTR length: 256 using short derivedKey, normal salt, SHA-512, with normal info with wrong (ECDH) key",0,{},{}],["Derived key of type name: AES-GCM length: 128 using short derivedKey, normal salt, SHA-512, with normal info",0,{},{}],["Derived key of type name: AES-GCM length: 128 using short derivedKey, normal salt, SHA-512, with normal info with bad hash name SHA512",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-GCM length: 128 using short derivedKey, normal salt, SHA-512, with normal info with missing deriveKey usage",0,{},{}],["Derived key of type name: AES-GCM length: 128 using short derivedKey, normal salt, SHA-512, with normal info with wrong (ECDH) key",0,{},{}],["Derived key of type name: AES-GCM length: 192 using short derivedKey, normal salt, SHA-512, with normal info",0,{},{}],["Derived key of type name: AES-GCM length: 192 using short derivedKey, normal salt, SHA-512, with normal info with bad hash name SHA512",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-GCM length: 192 using short derivedKey, normal salt, SHA-512, with normal info with missing deriveKey usage",0,{},{}],["Derived key of type name: AES-GCM length: 192 using short derivedKey, normal salt, SHA-512, with normal info with wrong (ECDH) key",0,{},{}],["Derived key of type name: AES-GCM length: 256 using short derivedKey, normal salt, SHA-512, with normal info",0,{},{}],["Derived key of type name: AES-GCM length: 256 using short derivedKey, normal salt, SHA-512, with normal info with bad hash name SHA512",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-GCM length: 256 using short derivedKey, normal salt, SHA-512, with normal info with missing deriveKey usage",0,{},{}],["Derived key of type name: AES-GCM length: 256 using short derivedKey, normal salt, SHA-512, with normal info with wrong (ECDH) key",0,{},{}],["Derived key of type name: AES-KW length: 128 using short derivedKey, normal salt, SHA-512, with normal info",0,{},{}],["Derived key of type name: AES-KW length: 128 using short derivedKey, normal salt, SHA-512, with normal info with bad hash name SHA512",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-KW length: 128 using short derivedKey, normal salt, SHA-512, with normal info with missing deriveKey usage",0,{},{}],["Derived key of type name: AES-KW length: 128 using short derivedKey, normal salt, SHA-512, with normal info with wrong (ECDH) key",0,{},{}],["Derived key of type name: AES-KW length: 192 using short derivedKey, normal salt, SHA-512, with normal info",0,{},{}],["Derived key of type name: AES-KW length: 192 using short derivedKey, normal salt, SHA-512, with normal info with bad hash name SHA512",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-KW length: 192 using short derivedKey, normal salt, SHA-512, with normal info with missing deriveKey usage",0,{},{}],["Derived key of type name: AES-KW length: 192 using short derivedKey, normal salt, SHA-512, with normal info with wrong (ECDH) key",0,{},{}],["Derived key of type name: AES-KW length: 256 using short derivedKey, normal salt, SHA-512, with normal info",0,{},{}],["Derived key of type name: AES-KW length: 256 using short derivedKey, normal salt, SHA-512, with normal info with bad hash name SHA512",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-KW length: 256 using short derivedKey, normal salt, SHA-512, with normal info with missing deriveKey usage",0,{},{}],["Derived key of type name: AES-KW length: 256 using short derivedKey, normal salt, SHA-512, with normal info with wrong (ECDH) key",0,{},{}],["Derived key of type name: HMAC hash: SHA-1 length: 256 using short derivedKey, normal salt, SHA-512, with normal info",0,{},{}],["Derived key of type name: HMAC hash: SHA-1 length: 256 using short derivedKey, normal salt, SHA-512, with normal info with bad hash name SHA512",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: HMAC hash: SHA-1 length: 256 using short derivedKey, normal salt, SHA-512, with normal info with missing deriveKey usage",0,{},{}],["Derived key of type name: HMAC hash: SHA-1 length: 256 using short derivedKey, normal salt, SHA-512, with normal info with wrong (ECDH) key",0,{},{}],["Derived key of type name: HMAC hash: SHA-256 length: 256 using short derivedKey, normal salt, SHA-512, with normal info",0,{},{}],["Derived key of type name: HMAC hash: SHA-256 length: 256 using short derivedKey, normal salt, SHA-512, with normal info with bad hash name SHA512",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: HMAC hash: SHA-256 length: 256 using short derivedKey, normal salt, SHA-512, with normal info with missing deriveKey usage",0,{},{}],["Derived key of type name: HMAC hash: SHA-256 length: 256 using short derivedKey, normal salt, SHA-512, with normal info with wrong (ECDH) key",0,{},{}],["Derived key of type name: HMAC hash: SHA-384 length: 256 using short derivedKey, normal salt, SHA-512, with normal info",0,{},{}],["Derived key of type name: HMAC hash: SHA-384 length: 256 using short derivedKey, normal salt, SHA-512, with normal info with bad hash name SHA512",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: HMAC hash: SHA-384 length: 256 using short derivedKey, normal salt, SHA-512, with normal info with missing deriveKey usage",0,{},{}],["Derived key of type name: HMAC hash: SHA-384 length: 256 using short derivedKey, normal salt, SHA-512, with normal info with wrong (ECDH) key",0,{},{}],["Derived key of type name: HMAC hash: SHA-512 length: 256 using short derivedKey, normal salt, SHA-512, with normal info",0,{},{}],["Derived key of type name: HMAC hash: SHA-512 length: 256 using short derivedKey, normal salt, SHA-512, with normal info with bad hash name SHA512",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: HMAC hash: SHA-512 length: 256 using short derivedKey, normal salt, SHA-512, with normal info with missing deriveKey usage",0,{},{}],["Derived key of type name: HMAC hash: SHA-512 length: 256 using short derivedKey, normal salt, SHA-512, with normal info with wrong (ECDH) key",0,{},{}],["short derivedKey, normal salt, SHA-512, with normal info with missing salt",1,"assert_equals: deriveBits missing salt correctly threw OperationError: An invalid or illegal string was specified expected \"TypeError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:128:33\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:124:36\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:123:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["short derivedKey, normal salt, SHA-512, with normal info with missing info",1,"assert_equals: deriveBits missing info correctly threw OperationError: An invalid or illegal string was specified expected \"TypeError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:138:33\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:134:36\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:133:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["short derivedKey, normal salt, SHA-512, with normal info with null length",1,"assert_equals: deriveBits with null length correctly threw OperationError: Data provided to an operation does not meet requirements expected \"TypeError\" but got \"DataError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:148:33\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:144:36\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:143:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["short derivedKey, normal salt, SHA-512, with normal info with non-multiple of 8 length",1,"assert_unreached: non-multiple of 8 length should have thrown an OperationError Reached unreachable code","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:156:33\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:154:36\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:153:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["short derivedKey, normal salt, SHA-512, with normal info with bad hash name SHA512",1,"assert_equals: deriveBits with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:170:33\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:166:36\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:164:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["short derivedKey, normal salt, SHA-512, with normal info with missing deriveBits usage",0,{},{}],["short derivedKey, normal salt, SHA-512, with normal info with wrong (ECDH) key",0,{},{}],["short derivedKey, normal salt, SHA-512, with empty info",0,{},{}],["short derivedKey, normal salt, SHA-512, with empty info with 0 length",1,"assert_equals: deriveBits with 0 length correctly threw OperationError: Data provided to an operation does not meet requirements expected \"OperationError\" but got \"DataError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:54:33\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:50:36\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:49:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-CBC length: 128 using short derivedKey, normal salt, SHA-512, with empty info",0,{},{}],["Derived key of type name: AES-CBC length: 128 using short derivedKey, normal salt, SHA-512, with empty info with bad hash name SHA512",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-CBC length: 128 using short derivedKey, normal salt, SHA-512, with empty info with missing deriveKey usage",0,{},{}],["Derived key of type name: AES-CBC length: 128 using short derivedKey, normal salt, SHA-512, with empty info with wrong (ECDH) key",0,{},{}],["Derived key of type name: AES-CBC length: 192 using short derivedKey, normal salt, SHA-512, with empty info",0,{},{}],["Derived key of type name: AES-CBC length: 192 using short derivedKey, normal salt, SHA-512, with empty info with bad hash name SHA512",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-CBC length: 192 using short derivedKey, normal salt, SHA-512, with empty info with missing deriveKey usage",0,{},{}],["Derived key of type name: AES-CBC length: 192 using short derivedKey, normal salt, SHA-512, with empty info with wrong (ECDH) key",0,{},{}],["Derived key of type name: AES-CBC length: 256 using short derivedKey, normal salt, SHA-512, with empty info",0,{},{}],["Derived key of type name: AES-CBC length: 256 using short derivedKey, normal salt, SHA-512, with empty info with bad hash name SHA512",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-CBC length: 256 using short derivedKey, normal salt, SHA-512, with empty info with missing deriveKey usage",0,{},{}],["Derived key of type name: AES-CBC length: 256 using short derivedKey, normal salt, SHA-512, with empty info with wrong (ECDH) key",0,{},{}],["Derived key of type name: AES-CTR length: 128 using short derivedKey, normal salt, SHA-512, with empty info",0,{},{}],["Derived key of type name: AES-CTR length: 128 using short derivedKey, normal salt, SHA-512, with empty info with bad hash name SHA512",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-CTR length: 128 using short derivedKey, normal salt, SHA-512, with empty info with missing deriveKey usage",0,{},{}],["Derived key of type name: AES-CTR length: 128 using short derivedKey, normal salt, SHA-512, with empty info with wrong (ECDH) key",0,{},{}],["Derived key of type name: AES-CTR length: 192 using short derivedKey, normal salt, SHA-512, with empty info",0,{},{}],["Derived key of type name: AES-CTR length: 192 using short derivedKey, normal salt, SHA-512, with empty info with bad hash name SHA512",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-CTR length: 192 using short derivedKey, normal salt, SHA-512, with empty info with missing deriveKey usage",0,{},{}],["Derived key of type name: AES-CTR length: 192 using short derivedKey, normal salt, SHA-512, with empty info with wrong (ECDH) key",0,{},{}],["Derived key of type name: AES-CTR length: 256 using short derivedKey, normal salt, SHA-512, with empty info",0,{},{}],["Derived key of type name: AES-CTR length: 256 using short derivedKey, normal salt, SHA-512, with empty info with bad hash name SHA512",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-CTR length: 256 using short derivedKey, normal salt, SHA-512, with empty info with missing deriveKey usage",0,{},{}],["Derived key of type name: AES-CTR length: 256 using short derivedKey, normal salt, SHA-512, with empty info with wrong (ECDH) key",0,{},{}],["Derived key of type name: AES-GCM length: 128 using short derivedKey, normal salt, SHA-512, with empty info",0,{},{}],["Derived key of type name: AES-GCM length: 128 using short derivedKey, normal salt, SHA-512, with empty info with bad hash name SHA512",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-GCM length: 128 using short derivedKey, normal salt, SHA-512, with empty info with missing deriveKey usage",0,{},{}],["Derived key of type name: AES-GCM length: 128 using short derivedKey, normal salt, SHA-512, with empty info with wrong (ECDH) key",0,{},{}],["Derived key of type name: AES-GCM length: 192 using short derivedKey, normal salt, SHA-512, with empty info",0,{},{}],["Derived key of type name: AES-GCM length: 192 using short derivedKey, normal salt, SHA-512, with empty info with bad hash name SHA512",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-GCM length: 192 using short derivedKey, normal salt, SHA-512, with empty info with missing deriveKey usage",0,{},{}],["Derived key of type name: AES-GCM length: 192 using short derivedKey, normal salt, SHA-512, with empty info with wrong (ECDH) key",0,{},{}],["Derived key of type name: AES-GCM length: 256 using short derivedKey, normal salt, SHA-512, with empty info",0,{},{}],["Derived key of type name: AES-GCM length: 256 using short derivedKey, normal salt, SHA-512, with empty info with bad hash name SHA512",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-GCM length: 256 using short derivedKey, normal salt, SHA-512, with empty info with missing deriveKey usage",0,{},{}],["Derived key of type name: AES-GCM length: 256 using short derivedKey, normal salt, SHA-512, with empty info with wrong (ECDH) key",0,{},{}],["Derived key of type name: AES-KW length: 128 using short derivedKey, normal salt, SHA-512, with empty info",0,{},{}],["Derived key of type name: AES-KW length: 128 using short derivedKey, normal salt, SHA-512, with empty info with bad hash name SHA512",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-KW length: 128 using short derivedKey, normal salt, SHA-512, with empty info with missing deriveKey usage",0,{},{}],["Derived key of type name: AES-KW length: 128 using short derivedKey, normal salt, SHA-512, with empty info with wrong (ECDH) key",0,{},{}],["Derived key of type name: AES-KW length: 192 using short derivedKey, normal salt, SHA-512, with empty info",0,{},{}],["Derived key of type name: AES-KW length: 192 using short derivedKey, normal salt, SHA-512, with empty info with bad hash name SHA512",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-KW length: 192 using short derivedKey, normal salt, SHA-512, with empty info with missing deriveKey usage",0,{},{}],["Derived key of type name: AES-KW length: 192 using short derivedKey, normal salt, SHA-512, with empty info with wrong (ECDH) key",0,{},{}],["Derived key of type name: AES-KW length: 256 using short derivedKey, normal salt, SHA-512, with empty info",0,{},{}],["Derived key of type name: AES-KW length: 256 using short derivedKey, normal salt, SHA-512, with empty info with bad hash name SHA512",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-KW length: 256 using short derivedKey, normal salt, SHA-512, with empty info with missing deriveKey usage",0,{},{}],["Derived key of type name: AES-KW length: 256 using short derivedKey, normal salt, SHA-512, with empty info with wrong (ECDH) key",0,{},{}],["Derived key of type name: HMAC hash: SHA-1 length: 256 using short derivedKey, normal salt, SHA-512, with empty info",0,{},{}],["Derived key of type name: HMAC hash: SHA-1 length: 256 using short derivedKey, normal salt, SHA-512, with empty info with bad hash name SHA512",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: HMAC hash: SHA-1 length: 256 using short derivedKey, normal salt, SHA-512, with empty info with missing deriveKey usage",0,{},{}],["Derived key of type name: HMAC hash: SHA-1 length: 256 using short derivedKey, normal salt, SHA-512, with empty info with wrong (ECDH) key",0,{},{}],["Derived key of type name: HMAC hash: SHA-256 length: 256 using short derivedKey, normal salt, SHA-512, with empty info",0,{},{}],["Derived key of type name: HMAC hash: SHA-256 length: 256 using short derivedKey, normal salt, SHA-512, with empty info with bad hash name SHA512",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: HMAC hash: SHA-256 length: 256 using short derivedKey, normal salt, SHA-512, with empty info with missing deriveKey usage",0,{},{}],["Derived key of type name: HMAC hash: SHA-256 length: 256 using short derivedKey, normal salt, SHA-512, with empty info with wrong (ECDH) key",0,{},{}],["Derived key of type name: HMAC hash: SHA-384 length: 256 using short derivedKey, normal salt, SHA-512, with empty info",0,{},{}],["Derived key of type name: HMAC hash: SHA-384 length: 256 using short derivedKey, normal salt, SHA-512, with empty info with bad hash name SHA512",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: HMAC hash: SHA-384 length: 256 using short derivedKey, normal salt, SHA-512, with empty info with missing deriveKey usage",0,{},{}],["Derived key of type name: HMAC hash: SHA-384 length: 256 using short derivedKey, normal salt, SHA-512, with empty info with wrong (ECDH) key",0,{},{}],["Derived key of type name: HMAC hash: SHA-512 length: 256 using short derivedKey, normal salt, SHA-512, with empty info",0,{},{}],["Derived key of type name: HMAC hash: SHA-512 length: 256 using short derivedKey, normal salt, SHA-512, with empty info with bad hash name SHA512",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: HMAC hash: SHA-512 length: 256 using short derivedKey, normal salt, SHA-512, with empty info with missing deriveKey usage",0,{},{}],["Derived key of type name: HMAC hash: SHA-512 length: 256 using short derivedKey, normal salt, SHA-512, with empty info with wrong (ECDH) key",0,{},{}],["short derivedKey, normal salt, SHA-512, with empty info with missing salt",1,"assert_equals: deriveBits missing salt correctly threw OperationError: An invalid or illegal string was specified expected \"TypeError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:128:33\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:124:36\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:123:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["short derivedKey, normal salt, SHA-512, with empty info with missing info",1,"assert_equals: deriveBits missing info correctly threw OperationError: An invalid or illegal string was specified expected \"TypeError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:138:33\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:134:36\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:133:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["short derivedKey, normal salt, SHA-512, with empty info with null length",1,"assert_equals: deriveBits with null length correctly threw OperationError: Data provided to an operation does not meet requirements expected \"TypeError\" but got \"DataError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:148:33\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:144:36\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:143:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["short derivedKey, normal salt, SHA-512, with empty info with non-multiple of 8 length",1,"assert_unreached: non-multiple of 8 length should have thrown an OperationError Reached unreachable code","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:156:33\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:154:36\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:153:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["short derivedKey, normal salt, SHA-512, with empty info with bad hash name SHA512",1,"assert_equals: deriveBits with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:170:33\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:166:36\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:164:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["short derivedKey, normal salt, SHA-512, with empty info with missing deriveBits usage",0,{},{}],["short derivedKey, normal salt, SHA-512, with empty info with wrong (ECDH) key",0,{},{}],["short derivedKey, normal salt, SHA-1, with normal info",0,{},{}],["short derivedKey, normal salt, SHA-1, with normal info with 0 length",1,"assert_equals: deriveBits with 0 length correctly threw OperationError: Data provided to an operation does not meet requirements expected \"OperationError\" but got \"DataError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:54:33\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:50:36\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:49:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-CBC length: 128 using short derivedKey, normal salt, SHA-1, with normal info",0,{},{}],["Derived key of type name: AES-CBC length: 128 using short derivedKey, normal salt, SHA-1, with normal info with bad hash name SHA1",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-CBC length: 128 using short derivedKey, normal salt, SHA-1, with normal info with missing deriveKey usage",0,{},{}],["Derived key of type name: AES-CBC length: 128 using short derivedKey, normal salt, SHA-1, with normal info with wrong (ECDH) key",0,{},{}],["Derived key of type name: AES-CBC length: 192 using short derivedKey, normal salt, SHA-1, with normal info",0,{},{}],["Derived key of type name: AES-CBC length: 192 using short derivedKey, normal salt, SHA-1, with normal info with bad hash name SHA1",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-CBC length: 192 using short derivedKey, normal salt, SHA-1, with normal info with missing deriveKey usage",0,{},{}],["Derived key of type name: AES-CBC length: 192 using short derivedKey, normal salt, SHA-1, with normal info with wrong (ECDH) key",0,{},{}],["Derived key of type name: AES-CBC length: 256 using short derivedKey, normal salt, SHA-1, with normal info",0,{},{}],["Derived key of type name: AES-CBC length: 256 using short derivedKey, normal salt, SHA-1, with normal info with bad hash name SHA1",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-CBC length: 256 using short derivedKey, normal salt, SHA-1, with normal info with missing deriveKey usage",0,{},{}],["Derived key of type name: AES-CBC length: 256 using short derivedKey, normal salt, SHA-1, with normal info with wrong (ECDH) key",0,{},{}],["Derived key of type name: AES-CTR length: 128 using short derivedKey, normal salt, SHA-1, with normal info",0,{},{}],["Derived key of type name: AES-CTR length: 128 using short derivedKey, normal salt, SHA-1, with normal info with bad hash name SHA1",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-CTR length: 128 using short derivedKey, normal salt, SHA-1, with normal info with missing deriveKey usage",0,{},{}],["Derived key of type name: AES-CTR length: 128 using short derivedKey, normal salt, SHA-1, with normal info with wrong (ECDH) key",0,{},{}],["Derived key of type name: AES-CTR length: 192 using short derivedKey, normal salt, SHA-1, with normal info",0,{},{}],["Derived key of type name: AES-CTR length: 192 using short derivedKey, normal salt, SHA-1, with normal info with bad hash name SHA1",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-CTR length: 192 using short derivedKey, normal salt, SHA-1, with normal info with missing deriveKey usage",0,{},{}],["Derived key of type name: AES-CTR length: 192 using short derivedKey, normal salt, SHA-1, with normal info with wrong (ECDH) key",0,{},{}],["Derived key of type name: AES-CTR length: 256 using short derivedKey, normal salt, SHA-1, with normal info",0,{},{}],["Derived key of type name: AES-CTR length: 256 using short derivedKey, normal salt, SHA-1, with normal info with bad hash name SHA1",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-CTR length: 256 using short derivedKey, normal salt, SHA-1, with normal info with missing deriveKey usage",0,{},{}],["Derived key of type name: AES-CTR length: 256 using short derivedKey, normal salt, SHA-1, with normal info with wrong (ECDH) key",0,{},{}],["Derived key of type name: AES-GCM length: 128 using short derivedKey, normal salt, SHA-1, with normal info",0,{},{}],["Derived key of type name: AES-GCM length: 128 using short derivedKey, normal salt, SHA-1, with normal info with bad hash name SHA1",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-GCM length: 128 using short derivedKey, normal salt, SHA-1, with normal info with missing deriveKey usage",0,{},{}],["Derived key of type name: AES-GCM length: 128 using short derivedKey, normal salt, SHA-1, with normal info with wrong (ECDH) key",0,{},{}],["Derived key of type name: AES-GCM length: 192 using short derivedKey, normal salt, SHA-1, with normal info",0,{},{}],["Derived key of type name: AES-GCM length: 192 using short derivedKey, normal salt, SHA-1, with normal info with bad hash name SHA1",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-GCM length: 192 using short derivedKey, normal salt, SHA-1, with normal info with missing deriveKey usage",0,{},{}],["Derived key of type name: AES-GCM length: 192 using short derivedKey, normal salt, SHA-1, with normal info with wrong (ECDH) key",0,{},{}],["Derived key of type name: AES-GCM length: 256 using short derivedKey, normal salt, SHA-1, with normal info",0,{},{}],["Derived key of type name: AES-GCM length: 256 using short derivedKey, normal salt, SHA-1, with normal info with bad hash name SHA1",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-GCM length: 256 using short derivedKey, normal salt, SHA-1, with normal info with missing deriveKey usage",0,{},{}],["Derived key of type name: AES-GCM length: 256 using short derivedKey, normal salt, SHA-1, with normal info with wrong (ECDH) key",0,{},{}],["Derived key of type name: AES-KW length: 128 using short derivedKey, normal salt, SHA-1, with normal info",0,{},{}],["Derived key of type name: AES-KW length: 128 using short derivedKey, normal salt, SHA-1, with normal info with bad hash name SHA1",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-KW length: 128 using short derivedKey, normal salt, SHA-1, with normal info with missing deriveKey usage",0,{},{}],["Derived key of type name: AES-KW length: 128 using short derivedKey, normal salt, SHA-1, with normal info with wrong (ECDH) key",0,{},{}],["Derived key of type name: AES-KW length: 192 using short derivedKey, normal salt, SHA-1, with normal info",0,{},{}],["Derived key of type name: AES-KW length: 192 using short derivedKey, normal salt, SHA-1, with normal info with bad hash name SHA1",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-KW length: 192 using short derivedKey, normal salt, SHA-1, with normal info with missing deriveKey usage",0,{},{}],["Derived key of type name: AES-KW length: 192 using short derivedKey, normal salt, SHA-1, with normal info with wrong (ECDH) key",0,{},{}],["Derived key of type name: AES-KW length: 256 using short derivedKey, normal salt, SHA-1, with normal info",0,{},{}],["Derived key of type name: AES-KW length: 256 using short derivedKey, normal salt, SHA-1, with normal info with bad hash name SHA1",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-KW length: 256 using short derivedKey, normal salt, SHA-1, with normal info with missing deriveKey usage",0,{},{}],["Derived key of type name: AES-KW length: 256 using short derivedKey, normal salt, SHA-1, with normal info with wrong (ECDH) key",0,{},{}],["Derived key of type name: HMAC hash: SHA-1 length: 256 using short derivedKey, normal salt, SHA-1, with normal info",0,{},{}],["Derived key of type name: HMAC hash: SHA-1 length: 256 using short derivedKey, normal salt, SHA-1, with normal info with bad hash name SHA1",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: HMAC hash: SHA-1 length: 256 using short derivedKey, normal salt, SHA-1, with normal info with missing deriveKey usage",0,{},{}],["Derived key of type name: HMAC hash: SHA-1 length: 256 using short derivedKey, normal salt, SHA-1, with normal info with wrong (ECDH) key",0,{},{}],["Derived key of type name: HMAC hash: SHA-256 length: 256 using short derivedKey, normal salt, SHA-1, with normal info",0,{},{}],["Derived key of type name: HMAC hash: SHA-256 length: 256 using short derivedKey, normal salt, SHA-1, with normal info with bad hash name SHA1",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: HMAC hash: SHA-256 length: 256 using short derivedKey, normal salt, SHA-1, with normal info with missing deriveKey usage",0,{},{}],["Derived key of type name: HMAC hash: SHA-256 length: 256 using short derivedKey, normal salt, SHA-1, with normal info with wrong (ECDH) key",0,{},{}],["Derived key of type name: HMAC hash: SHA-384 length: 256 using short derivedKey, normal salt, SHA-1, with normal info",0,{},{}],["Derived key of type name: HMAC hash: SHA-384 length: 256 using short derivedKey, normal salt, SHA-1, with normal info with bad hash name SHA1",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: HMAC hash: SHA-384 length: 256 using short derivedKey, normal salt, SHA-1, with normal info with missing deriveKey usage",0,{},{}],["Derived key of type name: HMAC hash: SHA-384 length: 256 using short derivedKey, normal salt, SHA-1, with normal info with wrong (ECDH) key",0,{},{}],["Derived key of type name: HMAC hash: SHA-512 length: 256 using short derivedKey, normal salt, SHA-1, with normal info",0,{},{}],["Derived key of type name: HMAC hash: SHA-512 length: 256 using short derivedKey, normal salt, SHA-1, with normal info with bad hash name SHA1",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: HMAC hash: SHA-512 length: 256 using short derivedKey, normal salt, SHA-1, with normal info with missing deriveKey usage",0,{},{}],["Derived key of type name: HMAC hash: SHA-512 length: 256 using short derivedKey, normal salt, SHA-1, with normal info with wrong (ECDH) key",0,{},{}],["short derivedKey, normal salt, SHA-1, with normal info with missing salt",1,"assert_equals: deriveBits missing salt correctly threw OperationError: An invalid or illegal string was specified expected \"TypeError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:128:33\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:124:36\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:123:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["short derivedKey, normal salt, SHA-1, with normal info with missing info",1,"assert_equals: deriveBits missing info correctly threw OperationError: An invalid or illegal string was specified expected \"TypeError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:138:33\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:134:36\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:133:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["short derivedKey, normal salt, SHA-1, with normal info with null length",1,"assert_equals: deriveBits with null length correctly threw OperationError: Data provided to an operation does not meet requirements expected \"TypeError\" but got \"DataError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:148:33\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:144:36\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:143:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["short derivedKey, normal salt, SHA-1, with normal info with non-multiple of 8 length",1,"assert_unreached: non-multiple of 8 length should have thrown an OperationError Reached unreachable code","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:156:33\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:154:36\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:153:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["short derivedKey, normal salt, SHA-1, with normal info with bad hash name SHA1",1,"assert_equals: deriveBits with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:170:33\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:166:36\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:164:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["short derivedKey, normal salt, SHA-1, with normal info with missing deriveBits usage",0,{},{}],["short derivedKey, normal salt, SHA-1, with normal info with wrong (ECDH) key",0,{},{}],["short derivedKey, normal salt, SHA-1, with empty info",0,{},{}],["short derivedKey, normal salt, SHA-1, with empty info with 0 length",1,"assert_equals: deriveBits with 0 length correctly threw OperationError: Data provided to an operation does not meet requirements expected \"OperationError\" but got \"DataError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:54:33\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:50:36\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:49:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-CBC length: 128 using short derivedKey, normal salt, SHA-1, with empty info",0,{},{}],["Derived key of type name: AES-CBC length: 128 using short derivedKey, normal salt, SHA-1, with empty info with bad hash name SHA1",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-CBC length: 128 using short derivedKey, normal salt, SHA-1, with empty info with missing deriveKey usage",0,{},{}],["Derived key of type name: AES-CBC length: 128 using short derivedKey, normal salt, SHA-1, with empty info with wrong (ECDH) key",0,{},{}],["Derived key of type name: AES-CBC length: 192 using short derivedKey, normal salt, SHA-1, with empty info",0,{},{}],["Derived key of type name: AES-CBC length: 192 using short derivedKey, normal salt, SHA-1, with empty info with bad hash name SHA1",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-CBC length: 192 using short derivedKey, normal salt, SHA-1, with empty info with missing deriveKey usage",0,{},{}],["Derived key of type name: AES-CBC length: 192 using short derivedKey, normal salt, SHA-1, with empty info with wrong (ECDH) key",0,{},{}],["Derived key of type name: AES-CBC length: 256 using short derivedKey, normal salt, SHA-1, with empty info",0,{},{}],["Derived key of type name: AES-CBC length: 256 using short derivedKey, normal salt, SHA-1, with empty info with bad hash name SHA1",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-CBC length: 256 using short derivedKey, normal salt, SHA-1, with empty info with missing deriveKey usage",0,{},{}],["Derived key of type name: AES-CBC length: 256 using short derivedKey, normal salt, SHA-1, with empty info with wrong (ECDH) key",0,{},{}],["Derived key of type name: AES-CTR length: 128 using short derivedKey, normal salt, SHA-1, with empty info",0,{},{}],["Derived key of type name: AES-CTR length: 128 using short derivedKey, normal salt, SHA-1, with empty info with bad hash name SHA1",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-CTR length: 128 using short derivedKey, normal salt, SHA-1, with empty info with missing deriveKey usage",0,{},{}],["Derived key of type name: AES-CTR length: 128 using short derivedKey, normal salt, SHA-1, with empty info with wrong (ECDH) key",0,{},{}],["Derived key of type name: AES-CTR length: 192 using short derivedKey, normal salt, SHA-1, with empty info",0,{},{}],["Derived key of type name: AES-CTR length: 192 using short derivedKey, normal salt, SHA-1, with empty info with bad hash name SHA1",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-CTR length: 192 using short derivedKey, normal salt, SHA-1, with empty info with missing deriveKey usage",0,{},{}],["Derived key of type name: AES-CTR length: 192 using short derivedKey, normal salt, SHA-1, with empty info with wrong (ECDH) key",0,{},{}],["Derived key of type name: AES-CTR length: 256 using short derivedKey, normal salt, SHA-1, with empty info",0,{},{}],["Derived key of type name: AES-CTR length: 256 using short derivedKey, normal salt, SHA-1, with empty info with bad hash name SHA1",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-CTR length: 256 using short derivedKey, normal salt, SHA-1, with empty info with missing deriveKey usage",0,{},{}],["Derived key of type name: AES-CTR length: 256 using short derivedKey, normal salt, SHA-1, with empty info with wrong (ECDH) key",0,{},{}],["Derived key of type name: AES-GCM length: 128 using short derivedKey, normal salt, SHA-1, with empty info",0,{},{}],["Derived key of type name: AES-GCM length: 128 using short derivedKey, normal salt, SHA-1, with empty info with bad hash name SHA1",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-GCM length: 128 using short derivedKey, normal salt, SHA-1, with empty info with missing deriveKey usage",0,{},{}],["Derived key of type name: AES-GCM length: 128 using short derivedKey, normal salt, SHA-1, with empty info with wrong (ECDH) key",0,{},{}],["Derived key of type name: AES-GCM length: 192 using short derivedKey, normal salt, SHA-1, with empty info",0,{},{}],["Derived key of type name: AES-GCM length: 192 using short derivedKey, normal salt, SHA-1, with empty info with bad hash name SHA1",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-GCM length: 192 using short derivedKey, normal salt, SHA-1, with empty info with missing deriveKey usage",0,{},{}],["Derived key of type name: AES-GCM length: 192 using short derivedKey, normal salt, SHA-1, with empty info with wrong (ECDH) key",0,{},{}],["Derived key of type name: AES-GCM length: 256 using short derivedKey, normal salt, SHA-1, with empty info",0,{},{}],["Derived key of type name: AES-GCM length: 256 using short derivedKey, normal salt, SHA-1, with empty info with bad hash name SHA1",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-GCM length: 256 using short derivedKey, normal salt, SHA-1, with empty info with missing deriveKey usage",0,{},{}],["Derived key of type name: AES-GCM length: 256 using short derivedKey, normal salt, SHA-1, with empty info with wrong (ECDH) key",0,{},{}],["Derived key of type name: AES-KW length: 128 using short derivedKey, normal salt, SHA-1, with empty info",0,{},{}],["Derived key of type name: AES-KW length: 128 using short derivedKey, normal salt, SHA-1, with empty info with bad hash name SHA1",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-KW length: 128 using short derivedKey, normal salt, SHA-1, with empty info with missing deriveKey usage",0,{},{}],["Derived key of type name: AES-KW length: 128 using short derivedKey, normal salt, SHA-1, with empty info with wrong (ECDH) key",0,{},{}],["Derived key of type name: AES-KW length: 192 using short derivedKey, normal salt, SHA-1, with empty info",0,{},{}],["Derived key of type name: AES-KW length: 192 using short derivedKey, normal salt, SHA-1, with empty info with bad hash name SHA1",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-KW length: 192 using short derivedKey, normal salt, SHA-1, with empty info with missing deriveKey usage",0,{},{}],["Derived key of type name: AES-KW length: 192 using short derivedKey, normal salt, SHA-1, with empty info with wrong (ECDH) key",0,{},{}],["Derived key of type name: AES-KW length: 256 using short derivedKey, normal salt, SHA-1, with empty info",0,{},{}],["Derived key of type name: AES-KW length: 256 using short derivedKey, normal salt, SHA-1, with empty info with bad hash name SHA1",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-KW length: 256 using short derivedKey, normal salt, SHA-1, with empty info with missing deriveKey usage",0,{},{}],["Derived key of type name: AES-KW length: 256 using short derivedKey, normal salt, SHA-1, with empty info with wrong (ECDH) key",0,{},{}],["Derived key of type name: HMAC hash: SHA-1 length: 256 using short derivedKey, normal salt, SHA-1, with empty info",0,{},{}],["Derived key of type name: HMAC hash: SHA-1 length: 256 using short derivedKey, normal salt, SHA-1, with empty info with bad hash name SHA1",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: HMAC hash: SHA-1 length: 256 using short derivedKey, normal salt, SHA-1, with empty info with missing deriveKey usage",0,{},{}],["Derived key of type name: HMAC hash: SHA-1 length: 256 using short derivedKey, normal salt, SHA-1, with empty info with wrong (ECDH) key",0,{},{}],["Derived key of type name: HMAC hash: SHA-256 length: 256 using short derivedKey, normal salt, SHA-1, with empty info",0,{},{}],["Derived key of type name: HMAC hash: SHA-256 length: 256 using short derivedKey, normal salt, SHA-1, with empty info with bad hash name SHA1",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: HMAC hash: SHA-256 length: 256 using short derivedKey, normal salt, SHA-1, with empty info with missing deriveKey usage",0,{},{}],["Derived key of type name: HMAC hash: SHA-256 length: 256 using short derivedKey, normal salt, SHA-1, with empty info with wrong (ECDH) key",0,{},{}],["Derived key of type name: HMAC hash: SHA-384 length: 256 using short derivedKey, normal salt, SHA-1, with empty info",0,{},{}],["Derived key of type name: HMAC hash: SHA-384 length: 256 using short derivedKey, normal salt, SHA-1, with empty info with bad hash name SHA1",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: HMAC hash: SHA-384 length: 256 using short derivedKey, normal salt, SHA-1, with empty info with missing deriveKey usage",0,{},{}],["Derived key of type name: HMAC hash: SHA-384 length: 256 using short derivedKey, normal salt, SHA-1, with empty info with wrong (ECDH) key",0,{},{}],["Derived key of type name: HMAC hash: SHA-512 length: 256 using short derivedKey, normal salt, SHA-1, with empty info",0,{},{}],["Derived key of type name: HMAC hash: SHA-512 length: 256 using short derivedKey, normal salt, SHA-1, with empty info with bad hash name SHA1",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: HMAC hash: SHA-512 length: 256 using short derivedKey, normal salt, SHA-1, with empty info with missing deriveKey usage",0,{},{}],["Derived key of type name: HMAC hash: SHA-512 length: 256 using short derivedKey, normal salt, SHA-1, with empty info with wrong (ECDH) key",0,{},{}],["short derivedKey, normal salt, SHA-1, with empty info with missing salt",1,"assert_equals: deriveBits missing salt correctly threw OperationError: An invalid or illegal string was specified expected \"TypeError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:128:33\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:124:36\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:123:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["short derivedKey, normal salt, SHA-1, with empty info with missing info",1,"assert_equals: deriveBits missing info correctly threw OperationError: An invalid or illegal string was specified expected \"TypeError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:138:33\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:134:36\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:133:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["short derivedKey, normal salt, SHA-1, with empty info with null length",1,"assert_equals: deriveBits with null length correctly threw OperationError: Data provided to an operation does not meet requirements expected \"TypeError\" but got \"DataError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:148:33\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:144:36\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:143:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["short derivedKey, normal salt, SHA-1, with empty info with non-multiple of 8 length",1,"assert_unreached: non-multiple of 8 length should have thrown an OperationError Reached unreachable code","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:156:33\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:154:36\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:153:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["short derivedKey, normal salt, SHA-1, with empty info with bad hash name SHA1",1,"assert_equals: deriveBits with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:170:33\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:166:36\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:164:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["short derivedKey, normal salt, SHA-1, with empty info with missing deriveBits usage",0,{},{}],["short derivedKey, normal salt, SHA-1, with empty info with wrong (ECDH) key",0,{},{}],["short derivedKey, normal salt, SHA-256, with normal info",0,{},{}],["short derivedKey, normal salt, SHA-256, with normal info with 0 length",1,"assert_equals: deriveBits with 0 length correctly threw OperationError: Data provided to an operation does not meet requirements expected \"OperationError\" but got \"DataError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:54:33\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:50:36\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:49:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-CBC length: 128 using short derivedKey, normal salt, SHA-256, with normal info",0,{},{}],["Derived key of type name: AES-CBC length: 128 using short derivedKey, normal salt, SHA-256, with normal info with bad hash name SHA256",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-CBC length: 128 using short derivedKey, normal salt, SHA-256, with normal info with missing deriveKey usage",0,{},{}],["Derived key of type name: AES-CBC length: 128 using short derivedKey, normal salt, SHA-256, with normal info with wrong (ECDH) key",0,{},{}],["Derived key of type name: AES-CBC length: 192 using short derivedKey, normal salt, SHA-256, with normal info",0,{},{}],["Derived key of type name: AES-CBC length: 192 using short derivedKey, normal salt, SHA-256, with normal info with bad hash name SHA256",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-CBC length: 192 using short derivedKey, normal salt, SHA-256, with normal info with missing deriveKey usage",0,{},{}],["Derived key of type name: AES-CBC length: 192 using short derivedKey, normal salt, SHA-256, with normal info with wrong (ECDH) key",0,{},{}],["Derived key of type name: AES-CBC length: 256 using short derivedKey, normal salt, SHA-256, with normal info",0,{},{}],["Derived key of type name: AES-CBC length: 256 using short derivedKey, normal salt, SHA-256, with normal info with bad hash name SHA256",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-CBC length: 256 using short derivedKey, normal salt, SHA-256, with normal info with missing deriveKey usage",0,{},{}],["Derived key of type name: AES-CBC length: 256 using short derivedKey, normal salt, SHA-256, with normal info with wrong (ECDH) key",0,{},{}],["Derived key of type name: AES-CTR length: 128 using short derivedKey, normal salt, SHA-256, with normal info",0,{},{}],["Derived key of type name: AES-CTR length: 128 using short derivedKey, normal salt, SHA-256, with normal info with bad hash name SHA256",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-CTR length: 128 using short derivedKey, normal salt, SHA-256, with normal info with missing deriveKey usage",0,{},{}],["Derived key of type name: AES-CTR length: 128 using short derivedKey, normal salt, SHA-256, with normal info with wrong (ECDH) key",0,{},{}],["Derived key of type name: AES-CTR length: 192 using short derivedKey, normal salt, SHA-256, with normal info",0,{},{}],["Derived key of type name: AES-CTR length: 192 using short derivedKey, normal salt, SHA-256, with normal info with bad hash name SHA256",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-CTR length: 192 using short derivedKey, normal salt, SHA-256, with normal info with missing deriveKey usage",0,{},{}],["Derived key of type name: AES-CTR length: 192 using short derivedKey, normal salt, SHA-256, with normal info with wrong (ECDH) key",0,{},{}],["Derived key of type name: AES-CTR length: 256 using short derivedKey, normal salt, SHA-256, with normal info",0,{},{}],["Derived key of type name: AES-CTR length: 256 using short derivedKey, normal salt, SHA-256, with normal info with bad hash name SHA256",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-CTR length: 256 using short derivedKey, normal salt, SHA-256, with normal info with missing deriveKey usage",0,{},{}],["Derived key of type name: AES-CTR length: 256 using short derivedKey, normal salt, SHA-256, with normal info with wrong (ECDH) key",0,{},{}],["Derived key of type name: AES-GCM length: 128 using short derivedKey, normal salt, SHA-256, with normal info",0,{},{}],["Derived key of type name: AES-GCM length: 128 using short derivedKey, normal salt, SHA-256, with normal info with bad hash name SHA256",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-GCM length: 128 using short derivedKey, normal salt, SHA-256, with normal info with missing deriveKey usage",0,{},{}],["Derived key of type name: AES-GCM length: 128 using short derivedKey, normal salt, SHA-256, with normal info with wrong (ECDH) key",0,{},{}],["Derived key of type name: AES-GCM length: 192 using short derivedKey, normal salt, SHA-256, with normal info",0,{},{}],["Derived key of type name: AES-GCM length: 192 using short derivedKey, normal salt, SHA-256, with normal info with bad hash name SHA256",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-GCM length: 192 using short derivedKey, normal salt, SHA-256, with normal info with missing deriveKey usage",0,{},{}],["Derived key of type name: AES-GCM length: 192 using short derivedKey, normal salt, SHA-256, with normal info with wrong (ECDH) key",0,{},{}],["Derived key of type name: AES-GCM length: 256 using short derivedKey, normal salt, SHA-256, with normal info",0,{},{}],["Derived key of type name: AES-GCM length: 256 using short derivedKey, normal salt, SHA-256, with normal info with bad hash name SHA256",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-GCM length: 256 using short derivedKey, normal salt, SHA-256, with normal info with missing deriveKey usage",0,{},{}],["Derived key of type name: AES-GCM length: 256 using short derivedKey, normal salt, SHA-256, with normal info with wrong (ECDH) key",0,{},{}],["Derived key of type name: AES-KW length: 128 using short derivedKey, normal salt, SHA-256, with normal info",0,{},{}],["Derived key of type name: AES-KW length: 128 using short derivedKey, normal salt, SHA-256, with normal info with bad hash name SHA256",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-KW length: 128 using short derivedKey, normal salt, SHA-256, with normal info with missing deriveKey usage",0,{},{}],["Derived key of type name: AES-KW length: 128 using short derivedKey, normal salt, SHA-256, with normal info with wrong (ECDH) key",0,{},{}],["Derived key of type name: AES-KW length: 192 using short derivedKey, normal salt, SHA-256, with normal info",0,{},{}],["Derived key of type name: AES-KW length: 192 using short derivedKey, normal salt, SHA-256, with normal info with bad hash name SHA256",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-KW length: 192 using short derivedKey, normal salt, SHA-256, with normal info with missing deriveKey usage",0,{},{}],["Derived key of type name: AES-KW length: 192 using short derivedKey, normal salt, SHA-256, with normal info with wrong (ECDH) key",0,{},{}],["Derived key of type name: AES-KW length: 256 using short derivedKey, normal salt, SHA-256, with normal info",0,{},{}],["Derived key of type name: AES-KW length: 256 using short derivedKey, normal salt, SHA-256, with normal info with bad hash name SHA256",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-KW length: 256 using short derivedKey, normal salt, SHA-256, with normal info with missing deriveKey usage",0,{},{}],["Derived key of type name: AES-KW length: 256 using short derivedKey, normal salt, SHA-256, with normal info with wrong (ECDH) key",0,{},{}],["Derived key of type name: HMAC hash: SHA-1 length: 256 using short derivedKey, normal salt, SHA-256, with normal info",0,{},{}],["Derived key of type name: HMAC hash: SHA-1 length: 256 using short derivedKey, normal salt, SHA-256, with normal info with bad hash name SHA256",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: HMAC hash: SHA-1 length: 256 using short derivedKey, normal salt, SHA-256, with normal info with missing deriveKey usage",0,{},{}],["Derived key of type name: HMAC hash: SHA-1 length: 256 using short derivedKey, normal salt, SHA-256, with normal info with wrong (ECDH) key",0,{},{}],["Derived key of type name: HMAC hash: SHA-256 length: 256 using short derivedKey, normal salt, SHA-256, with normal info",0,{},{}],["Derived key of type name: HMAC hash: SHA-256 length: 256 using short derivedKey, normal salt, SHA-256, with normal info with bad hash name SHA256",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: HMAC hash: SHA-256 length: 256 using short derivedKey, normal salt, SHA-256, with normal info with missing deriveKey usage",0,{},{}],["Derived key of type name: HMAC hash: SHA-256 length: 256 using short derivedKey, normal salt, SHA-256, with normal info with wrong (ECDH) key",0,{},{}],["Derived key of type name: HMAC hash: SHA-384 length: 256 using short derivedKey, normal salt, SHA-256, with normal info",0,{},{}],["Derived key of type name: HMAC hash: SHA-384 length: 256 using short derivedKey, normal salt, SHA-256, with normal info with bad hash name SHA256",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: HMAC hash: SHA-384 length: 256 using short derivedKey, normal salt, SHA-256, with normal info with missing deriveKey usage",0,{},{}],["Derived key of type name: HMAC hash: SHA-384 length: 256 using short derivedKey, normal salt, SHA-256, with normal info with wrong (ECDH) key",0,{},{}],["Derived key of type name: HMAC hash: SHA-512 length: 256 using short derivedKey, normal salt, SHA-256, with normal info",0,{},{}],["Derived key of type name: HMAC hash: SHA-512 length: 256 using short derivedKey, normal salt, SHA-256, with normal info with bad hash name SHA256",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: HMAC hash: SHA-512 length: 256 using short derivedKey, normal salt, SHA-256, with normal info with missing deriveKey usage",0,{},{}],["Derived key of type name: HMAC hash: SHA-512 length: 256 using short derivedKey, normal salt, SHA-256, with normal info with wrong (ECDH) key",0,{},{}],["short derivedKey, normal salt, SHA-256, with normal info with missing salt",1,"assert_equals: deriveBits missing salt correctly threw OperationError: An invalid or illegal string was specified expected \"TypeError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:128:33\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:124:36\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:123:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["short derivedKey, normal salt, SHA-256, with normal info with missing info",1,"assert_equals: deriveBits missing info correctly threw OperationError: An invalid or illegal string was specified expected \"TypeError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:138:33\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:134:36\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:133:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["short derivedKey, normal salt, SHA-256, with normal info with null length",1,"assert_equals: deriveBits with null length correctly threw OperationError: Data provided to an operation does not meet requirements expected \"TypeError\" but got \"DataError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:148:33\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:144:36\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:143:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["short derivedKey, normal salt, SHA-256, with normal info with non-multiple of 8 length",1,"assert_unreached: non-multiple of 8 length should have thrown an OperationError Reached unreachable code","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:156:33\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:154:36\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:153:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["short derivedKey, normal salt, SHA-256, with normal info with bad hash name SHA256",1,"assert_equals: deriveBits with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:170:33\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:166:36\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:164:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["short derivedKey, normal salt, SHA-256, with normal info with missing deriveBits usage",0,{},{}],["short derivedKey, normal salt, SHA-256, with normal info with wrong (ECDH) key",0,{},{}],["short derivedKey, normal salt, SHA-256, with empty info",0,{},{}],["short derivedKey, normal salt, SHA-256, with empty info with 0 length",1,"assert_equals: deriveBits with 0 length correctly threw OperationError: Data provided to an operation does not meet requirements expected \"OperationError\" but got \"DataError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:54:33\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:50:36\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:49:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-CBC length: 128 using short derivedKey, normal salt, SHA-256, with empty info",0,{},{}],["Derived key of type name: AES-CBC length: 128 using short derivedKey, normal salt, SHA-256, with empty info with bad hash name SHA256",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-CBC length: 128 using short derivedKey, normal salt, SHA-256, with empty info with missing deriveKey usage",0,{},{}],["Derived key of type name: AES-CBC length: 128 using short derivedKey, normal salt, SHA-256, with empty info with wrong (ECDH) key",0,{},{}],["Derived key of type name: AES-CBC length: 192 using short derivedKey, normal salt, SHA-256, with empty info",0,{},{}],["Derived key of type name: AES-CBC length: 192 using short derivedKey, normal salt, SHA-256, with empty info with bad hash name SHA256",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-CBC length: 192 using short derivedKey, normal salt, SHA-256, with empty info with missing deriveKey usage",0,{},{}],["Derived key of type name: AES-CBC length: 192 using short derivedKey, normal salt, SHA-256, with empty info with wrong (ECDH) key",0,{},{}],["Derived key of type name: AES-CBC length: 256 using short derivedKey, normal salt, SHA-256, with empty info",0,{},{}],["Derived key of type name: AES-CBC length: 256 using short derivedKey, normal salt, SHA-256, with empty info with bad hash name SHA256",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-CBC length: 256 using short derivedKey, normal salt, SHA-256, with empty info with missing deriveKey usage",0,{},{}],["Derived key of type name: AES-CBC length: 256 using short derivedKey, normal salt, SHA-256, with empty info with wrong (ECDH) key",0,{},{}],["Derived key of type name: AES-CTR length: 128 using short derivedKey, normal salt, SHA-256, with empty info",0,{},{}],["Derived key of type name: AES-CTR length: 128 using short derivedKey, normal salt, SHA-256, with empty info with bad hash name SHA256",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-CTR length: 128 using short derivedKey, normal salt, SHA-256, with empty info with missing deriveKey usage",0,{},{}],["Derived key of type name: AES-CTR length: 128 using short derivedKey, normal salt, SHA-256, with empty info with wrong (ECDH) key",0,{},{}],["Derived key of type name: AES-CTR length: 192 using short derivedKey, normal salt, SHA-256, with empty info",0,{},{}],["Derived key of type name: AES-CTR length: 192 using short derivedKey, normal salt, SHA-256, with empty info with bad hash name SHA256",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-CTR length: 192 using short derivedKey, normal salt, SHA-256, with empty info with missing deriveKey usage",0,{},{}],["Derived key of type name: AES-CTR length: 192 using short derivedKey, normal salt, SHA-256, with empty info with wrong (ECDH) key",0,{},{}],["Derived key of type name: AES-CTR length: 256 using short derivedKey, normal salt, SHA-256, with empty info",0,{},{}],["Derived key of type name: AES-CTR length: 256 using short derivedKey, normal salt, SHA-256, with empty info with bad hash name SHA256",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-CTR length: 256 using short derivedKey, normal salt, SHA-256, with empty info with missing deriveKey usage",0,{},{}],["Derived key of type name: AES-CTR length: 256 using short derivedKey, normal salt, SHA-256, with empty info with wrong (ECDH) key",0,{},{}],["Derived key of type name: AES-GCM length: 128 using short derivedKey, normal salt, SHA-256, with empty info",0,{},{}],["Derived key of type name: AES-GCM length: 128 using short derivedKey, normal salt, SHA-256, with empty info with bad hash name SHA256",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-GCM length: 128 using short derivedKey, normal salt, SHA-256, with empty info with missing deriveKey usage",0,{},{}],["Derived key of type name: AES-GCM length: 128 using short derivedKey, normal salt, SHA-256, with empty info with wrong (ECDH) key",0,{},{}],["Derived key of type name: AES-GCM length: 192 using short derivedKey, normal salt, SHA-256, with empty info",0,{},{}],["Derived key of type name: AES-GCM length: 192 using short derivedKey, normal salt, SHA-256, with empty info with bad hash name SHA256",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-GCM length: 192 using short derivedKey, normal salt, SHA-256, with empty info with missing deriveKey usage",0,{},{}],["Derived key of type name: AES-GCM length: 192 using short derivedKey, normal salt, SHA-256, with empty info with wrong (ECDH) key",0,{},{}],["Derived key of type name: AES-GCM length: 256 using short derivedKey, normal salt, SHA-256, with empty info",0,{},{}],["Derived key of type name: AES-GCM length: 256 using short derivedKey, normal salt, SHA-256, with empty info with bad hash name SHA256",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-GCM length: 256 using short derivedKey, normal salt, SHA-256, with empty info with missing deriveKey usage",0,{},{}],["Derived key of type name: AES-GCM length: 256 using short derivedKey, normal salt, SHA-256, with empty info with wrong (ECDH) key",0,{},{}],["Derived key of type name: AES-KW length: 128 using short derivedKey, normal salt, SHA-256, with empty info",0,{},{}],["Derived key of type name: AES-KW length: 128 using short derivedKey, normal salt, SHA-256, with empty info with bad hash name SHA256",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-KW length: 128 using short derivedKey, normal salt, SHA-256, with empty info with missing deriveKey usage",0,{},{}],["Derived key of type name: AES-KW length: 128 using short derivedKey, normal salt, SHA-256, with empty info with wrong (ECDH) key",0,{},{}],["Derived key of type name: AES-KW length: 192 using short derivedKey, normal salt, SHA-256, with empty info",0,{},{}],["Derived key of type name: AES-KW length: 192 using short derivedKey, normal salt, SHA-256, with empty info with bad hash name SHA256",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-KW length: 192 using short derivedKey, normal salt, SHA-256, with empty info with missing deriveKey usage",0,{},{}],["Derived key of type name: AES-KW length: 192 using short derivedKey, normal salt, SHA-256, with empty info with wrong (ECDH) key",0,{},{}],["Derived key of type name: AES-KW length: 256 using short derivedKey, normal salt, SHA-256, with empty info",0,{},{}],["Derived key of type name: AES-KW length: 256 using short derivedKey, normal salt, SHA-256, with empty info with bad hash name SHA256",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-KW length: 256 using short derivedKey, normal salt, SHA-256, with empty info with missing deriveKey usage",0,{},{}],["Derived key of type name: AES-KW length: 256 using short derivedKey, normal salt, SHA-256, with empty info with wrong (ECDH) key",0,{},{}],["Derived key of type name: HMAC hash: SHA-1 length: 256 using short derivedKey, normal salt, SHA-256, with empty info",0,{},{}],["Derived key of type name: HMAC hash: SHA-1 length: 256 using short derivedKey, normal salt, SHA-256, with empty info with bad hash name SHA256",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: HMAC hash: SHA-1 length: 256 using short derivedKey, normal salt, SHA-256, with empty info with missing deriveKey usage",0,{},{}],["Derived key of type name: HMAC hash: SHA-1 length: 256 using short derivedKey, normal salt, SHA-256, with empty info with wrong (ECDH) key",0,{},{}],["Derived key of type name: HMAC hash: SHA-256 length: 256 using short derivedKey, normal salt, SHA-256, with empty info",0,{},{}],["Derived key of type name: HMAC hash: SHA-256 length: 256 using short derivedKey, normal salt, SHA-256, with empty info with bad hash name SHA256",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: HMAC hash: SHA-256 length: 256 using short derivedKey, normal salt, SHA-256, with empty info with missing deriveKey usage",0,{},{}],["Derived key of type name: HMAC hash: SHA-256 length: 256 using short derivedKey, normal salt, SHA-256, with empty info with wrong (ECDH) key",0,{},{}],["Derived key of type name: HMAC hash: SHA-384 length: 256 using short derivedKey, normal salt, SHA-256, with empty info",0,{},{}],["Derived key of type name: HMAC hash: SHA-384 length: 256 using short derivedKey, normal salt, SHA-256, with empty info with bad hash name SHA256",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: HMAC hash: SHA-384 length: 256 using short derivedKey, normal salt, SHA-256, with empty info with missing deriveKey usage",0,{},{}],["Derived key of type name: HMAC hash: SHA-384 length: 256 using short derivedKey, normal salt, SHA-256, with empty info with wrong (ECDH) key",0,{},{}],["Derived key of type name: HMAC hash: SHA-512 length: 256 using short derivedKey, normal salt, SHA-256, with empty info",0,{},{}],["Derived key of type name: HMAC hash: SHA-512 length: 256 using short derivedKey, normal salt, SHA-256, with empty info with bad hash name SHA256",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: HMAC hash: SHA-512 length: 256 using short derivedKey, normal salt, SHA-256, with empty info with missing deriveKey usage",0,{},{}],["Derived key of type name: HMAC hash: SHA-512 length: 256 using short derivedKey, normal salt, SHA-256, with empty info with wrong (ECDH) key",0,{},{}],["short derivedKey, normal salt, SHA-256, with empty info with missing salt",1,"assert_equals: deriveBits missing salt correctly threw OperationError: An invalid or illegal string was specified expected \"TypeError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:128:33\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:124:36\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:123:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["short derivedKey, normal salt, SHA-256, with empty info with missing info",1,"assert_equals: deriveBits missing info correctly threw OperationError: An invalid or illegal string was specified expected \"TypeError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:138:33\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:134:36\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:133:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["short derivedKey, normal salt, SHA-256, with empty info with null length",1,"assert_equals: deriveBits with null length correctly threw OperationError: Data provided to an operation does not meet requirements expected \"TypeError\" but got \"DataError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:148:33\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:144:36\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:143:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["short derivedKey, normal salt, SHA-256, with empty info with non-multiple of 8 length",1,"assert_unreached: non-multiple of 8 length should have thrown an OperationError Reached unreachable code","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:156:33\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:154:36\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:153:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["short derivedKey, normal salt, SHA-256, with empty info with bad hash name SHA256",1,"assert_equals: deriveBits with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:170:33\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:166:36\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:164:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["short derivedKey, normal salt, SHA-256, with empty info with missing deriveBits usage",0,{},{}],["short derivedKey, normal salt, SHA-256, with empty info with wrong (ECDH) key",0,{},{}],["short derivedKey, normal salt, PBKDF2, with normal info with non-digest algorithm PBKDF2",0,{},{}],["Derived key of type name: AES-CBC length: 128 using short derivedKey, normal salt, PBKDF2, with normal info",0,{},{}],["Derived key of type name: AES-CBC length: 192 using short derivedKey, normal salt, PBKDF2, with normal info",0,{},{}],["Derived key of type name: AES-CBC length: 256 using short derivedKey, normal salt, PBKDF2, with normal info",0,{},{}],["Derived key of type name: AES-CTR length: 128 using short derivedKey, normal salt, PBKDF2, with normal info",0,{},{}],["Derived key of type name: AES-CTR length: 192 using short derivedKey, normal salt, PBKDF2, with normal info",0,{},{}],["Derived key of type name: AES-CTR length: 256 using short derivedKey, normal salt, PBKDF2, with normal info",0,{},{}],["Derived key of type name: AES-GCM length: 128 using short derivedKey, normal salt, PBKDF2, with normal info",0,{},{}],["Derived key of type name: AES-GCM length: 192 using short derivedKey, normal salt, PBKDF2, with normal info",0,{},{}],["Derived key of type name: AES-GCM length: 256 using short derivedKey, normal salt, PBKDF2, with normal info",0,{},{}],["Derived key of type name: AES-KW length: 128 using short derivedKey, normal salt, PBKDF2, with normal info",0,{},{}],["Derived key of type name: AES-KW length: 192 using short derivedKey, normal salt, PBKDF2, with normal info",0,{},{}],["Derived key of type name: AES-KW length: 256 using short derivedKey, normal salt, PBKDF2, with normal info",0,{},{}],["Derived key of type name: HMAC hash: SHA-1 length: 256 using short derivedKey, normal salt, PBKDF2, with normal info",0,{},{}],["Derived key of type name: HMAC hash: SHA-256 length: 256 using short derivedKey, normal salt, PBKDF2, with normal info",0,{},{}],["Derived key of type name: HMAC hash: SHA-384 length: 256 using short derivedKey, normal salt, PBKDF2, with normal info",0,{},{}],["Derived key of type name: HMAC hash: SHA-512 length: 256 using short derivedKey, normal salt, PBKDF2, with normal info",0,{},{}],["short derivedKey, normal salt, PBKDF2, with empty info with non-digest algorithm PBKDF2",0,{},{}],["Derived key of type name: AES-CBC length: 128 using short derivedKey, normal salt, PBKDF2, with empty info",0,{},{}],["Derived key of type name: AES-CBC length: 192 using short derivedKey, normal salt, PBKDF2, with empty info",0,{},{}],["Derived key of type name: AES-CBC length: 256 using short derivedKey, normal salt, PBKDF2, with empty info",0,{},{}],["Derived key of type name: AES-CTR length: 128 using short derivedKey, normal salt, PBKDF2, with empty info",0,{},{}],["Derived key of type name: AES-CTR length: 192 using short derivedKey, normal salt, PBKDF2, with empty info",0,{},{}],["Derived key of type name: AES-CTR length: 256 using short derivedKey, normal salt, PBKDF2, with empty info",0,{},{}],["Derived key of type name: AES-GCM length: 128 using short derivedKey, normal salt, PBKDF2, with empty info",0,{},{}],["Derived key of type name: AES-GCM length: 192 using short derivedKey, normal salt, PBKDF2, with empty info",0,{},{}],["Derived key of type name: AES-GCM length: 256 using short derivedKey, normal salt, PBKDF2, with empty info",0,{},{}],["Derived key of type name: AES-KW length: 128 using short derivedKey, normal salt, PBKDF2, with empty info",0,{},{}],["Derived key of type name: AES-KW length: 192 using short derivedKey, normal salt, PBKDF2, with empty info",0,{},{}],["Derived key of type name: AES-KW length: 256 using short derivedKey, normal salt, PBKDF2, with empty info",0,{},{}],["Derived key of type name: HMAC hash: SHA-1 length: 256 using short derivedKey, normal salt, PBKDF2, with empty info",0,{},{}],["Derived key of type name: HMAC hash: SHA-256 length: 256 using short derivedKey, normal salt, PBKDF2, with empty info",0,{},{}],["Derived key of type name: HMAC hash: SHA-384 length: 256 using short derivedKey, normal salt, PBKDF2, with empty info",0,{},{}],["Derived key of type name: HMAC hash: SHA-512 length: 256 using short derivedKey, normal salt, PBKDF2, with empty info",0,{},{}],["short derivedKey, empty salt, SHA-384, with normal info",0,{},{}],["short derivedKey, empty salt, SHA-384, with normal info with 0 length",1,"assert_equals: deriveBits with 0 length correctly threw OperationError: Data provided to an operation does not meet requirements expected \"OperationError\" but got \"DataError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:54:33\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:50:36\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:49:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-CBC length: 128 using short derivedKey, empty salt, SHA-384, with normal info",0,{},{}],["Derived key of type name: AES-CBC length: 128 using short derivedKey, empty salt, SHA-384, with normal info with bad hash name SHA384",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-CBC length: 128 using short derivedKey, empty salt, SHA-384, with normal info with missing deriveKey usage",0,{},{}],["Derived key of type name: AES-CBC length: 128 using short derivedKey, empty salt, SHA-384, with normal info with wrong (ECDH) key",0,{},{}],["Derived key of type name: AES-CBC length: 192 using short derivedKey, empty salt, SHA-384, with normal info",0,{},{}],["Derived key of type name: AES-CBC length: 192 using short derivedKey, empty salt, SHA-384, with normal info with bad hash name SHA384",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-CBC length: 192 using short derivedKey, empty salt, SHA-384, with normal info with missing deriveKey usage",0,{},{}],["Derived key of type name: AES-CBC length: 192 using short derivedKey, empty salt, SHA-384, with normal info with wrong (ECDH) key",0,{},{}],["Derived key of type name: AES-CBC length: 256 using short derivedKey, empty salt, SHA-384, with normal info",0,{},{}],["Derived key of type name: AES-CBC length: 256 using short derivedKey, empty salt, SHA-384, with normal info with bad hash name SHA384",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-CBC length: 256 using short derivedKey, empty salt, SHA-384, with normal info with missing deriveKey usage",0,{},{}],["Derived key of type name: AES-CBC length: 256 using short derivedKey, empty salt, SHA-384, with normal info with wrong (ECDH) key",0,{},{}],["Derived key of type name: AES-CTR length: 128 using short derivedKey, empty salt, SHA-384, with normal info",0,{},{}],["Derived key of type name: AES-CTR length: 128 using short derivedKey, empty salt, SHA-384, with normal info with bad hash name SHA384",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-CTR length: 128 using short derivedKey, empty salt, SHA-384, with normal info with missing deriveKey usage",0,{},{}],["Derived key of type name: AES-CTR length: 128 using short derivedKey, empty salt, SHA-384, with normal info with wrong (ECDH) key",0,{},{}],["Derived key of type name: AES-CTR length: 192 using short derivedKey, empty salt, SHA-384, with normal info",0,{},{}],["Derived key of type name: AES-CTR length: 192 using short derivedKey, empty salt, SHA-384, with normal info with bad hash name SHA384",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-CTR length: 192 using short derivedKey, empty salt, SHA-384, with normal info with missing deriveKey usage",0,{},{}],["Derived key of type name: AES-CTR length: 192 using short derivedKey, empty salt, SHA-384, with normal info with wrong (ECDH) key",0,{},{}],["Derived key of type name: AES-CTR length: 256 using short derivedKey, empty salt, SHA-384, with normal info",0,{},{}],["Derived key of type name: AES-CTR length: 256 using short derivedKey, empty salt, SHA-384, with normal info with bad hash name SHA384",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-CTR length: 256 using short derivedKey, empty salt, SHA-384, with normal info with missing deriveKey usage",0,{},{}],["Derived key of type name: AES-CTR length: 256 using short derivedKey, empty salt, SHA-384, with normal info with wrong (ECDH) key",0,{},{}],["Derived key of type name: AES-GCM length: 128 using short derivedKey, empty salt, SHA-384, with normal info",0,{},{}],["Derived key of type name: AES-GCM length: 128 using short derivedKey, empty salt, SHA-384, with normal info with bad hash name SHA384",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-GCM length: 128 using short derivedKey, empty salt, SHA-384, with normal info with missing deriveKey usage",0,{},{}],["Derived key of type name: AES-GCM length: 128 using short derivedKey, empty salt, SHA-384, with normal info with wrong (ECDH) key",0,{},{}],["Derived key of type name: AES-GCM length: 192 using short derivedKey, empty salt, SHA-384, with normal info",0,{},{}],["Derived key of type name: AES-GCM length: 192 using short derivedKey, empty salt, SHA-384, with normal info with bad hash name SHA384",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-GCM length: 192 using short derivedKey, empty salt, SHA-384, with normal info with missing deriveKey usage",0,{},{}],["Derived key of type name: AES-GCM length: 192 using short derivedKey, empty salt, SHA-384, with normal info with wrong (ECDH) key",0,{},{}],["Derived key of type name: AES-GCM length: 256 using short derivedKey, empty salt, SHA-384, with normal info",0,{},{}],["Derived key of type name: AES-GCM length: 256 using short derivedKey, empty salt, SHA-384, with normal info with bad hash name SHA384",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-GCM length: 256 using short derivedKey, empty salt, SHA-384, with normal info with missing deriveKey usage",0,{},{}],["Derived key of type name: AES-GCM length: 256 using short derivedKey, empty salt, SHA-384, with normal info with wrong (ECDH) key",0,{},{}],["Derived key of type name: AES-KW length: 128 using short derivedKey, empty salt, SHA-384, with normal info",0,{},{}],["Derived key of type name: AES-KW length: 128 using short derivedKey, empty salt, SHA-384, with normal info with bad hash name SHA384",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-KW length: 128 using short derivedKey, empty salt, SHA-384, with normal info with missing deriveKey usage",0,{},{}],["Derived key of type name: AES-KW length: 128 using short derivedKey, empty salt, SHA-384, with normal info with wrong (ECDH) key",0,{},{}],["Derived key of type name: AES-KW length: 192 using short derivedKey, empty salt, SHA-384, with normal info",0,{},{}],["Derived key of type name: AES-KW length: 192 using short derivedKey, empty salt, SHA-384, with normal info with bad hash name SHA384",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-KW length: 192 using short derivedKey, empty salt, SHA-384, with normal info with missing deriveKey usage",0,{},{}],["Derived key of type name: AES-KW length: 192 using short derivedKey, empty salt, SHA-384, with normal info with wrong (ECDH) key",0,{},{}],["Derived key of type name: AES-KW length: 256 using short derivedKey, empty salt, SHA-384, with normal info",0,{},{}],["Derived key of type name: AES-KW length: 256 using short derivedKey, empty salt, SHA-384, with normal info with bad hash name SHA384",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-KW length: 256 using short derivedKey, empty salt, SHA-384, with normal info with missing deriveKey usage",0,{},{}],["Derived key of type name: AES-KW length: 256 using short derivedKey, empty salt, SHA-384, with normal info with wrong (ECDH) key",0,{},{}],["Derived key of type name: HMAC hash: SHA-1 length: 256 using short derivedKey, empty salt, SHA-384, with normal info",0,{},{}],["Derived key of type name: HMAC hash: SHA-1 length: 256 using short derivedKey, empty salt, SHA-384, with normal info with bad hash name SHA384",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: HMAC hash: SHA-1 length: 256 using short derivedKey, empty salt, SHA-384, with normal info with missing deriveKey usage",0,{},{}],["Derived key of type name: HMAC hash: SHA-1 length: 256 using short derivedKey, empty salt, SHA-384, with normal info with wrong (ECDH) key",0,{},{}],["Derived key of type name: HMAC hash: SHA-256 length: 256 using short derivedKey, empty salt, SHA-384, with normal info",0,{},{}],["Derived key of type name: HMAC hash: SHA-256 length: 256 using short derivedKey, empty salt, SHA-384, with normal info with bad hash name SHA384",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: HMAC hash: SHA-256 length: 256 using short derivedKey, empty salt, SHA-384, with normal info with missing deriveKey usage",0,{},{}],["Derived key of type name: HMAC hash: SHA-256 length: 256 using short derivedKey, empty salt, SHA-384, with normal info with wrong (ECDH) key",0,{},{}],["Derived key of type name: HMAC hash: SHA-384 length: 256 using short derivedKey, empty salt, SHA-384, with normal info",0,{},{}],["Derived key of type name: HMAC hash: SHA-384 length: 256 using short derivedKey, empty salt, SHA-384, with normal info with bad hash name SHA384",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: HMAC hash: SHA-384 length: 256 using short derivedKey, empty salt, SHA-384, with normal info with missing deriveKey usage",0,{},{}],["Derived key of type name: HMAC hash: SHA-384 length: 256 using short derivedKey, empty salt, SHA-384, with normal info with wrong (ECDH) key",0,{},{}],["Derived key of type name: HMAC hash: SHA-512 length: 256 using short derivedKey, empty salt, SHA-384, with normal info",0,{},{}],["Derived key of type name: HMAC hash: SHA-512 length: 256 using short derivedKey, empty salt, SHA-384, with normal info with bad hash name SHA384",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: HMAC hash: SHA-512 length: 256 using short derivedKey, empty salt, SHA-384, with normal info with missing deriveKey usage",0,{},{}],["Derived key of type name: HMAC hash: SHA-512 length: 256 using short derivedKey, empty salt, SHA-384, with normal info with wrong (ECDH) key",0,{},{}],["short derivedKey, empty salt, SHA-384, with normal info with missing salt",1,"assert_equals: deriveBits missing salt correctly threw OperationError: An invalid or illegal string was specified expected \"TypeError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:128:33\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:124:36\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:123:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["short derivedKey, empty salt, SHA-384, with normal info with missing info",1,"assert_equals: deriveBits missing info correctly threw OperationError: An invalid or illegal string was specified expected \"TypeError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:138:33\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:134:36\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:133:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["short derivedKey, empty salt, SHA-384, with normal info with null length",1,"assert_equals: deriveBits with null length correctly threw OperationError: Data provided to an operation does not meet requirements expected \"TypeError\" but got \"DataError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:148:33\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:144:36\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:143:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["short derivedKey, empty salt, SHA-384, with normal info with non-multiple of 8 length",1,"assert_unreached: non-multiple of 8 length should have thrown an OperationError Reached unreachable code","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:156:33\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:154:36\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:153:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["short derivedKey, empty salt, SHA-384, with normal info with bad hash name SHA384",1,"assert_equals: deriveBits with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:170:33\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:166:36\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:164:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["short derivedKey, empty salt, SHA-384, with normal info with missing deriveBits usage",0,{},{}],["short derivedKey, empty salt, SHA-384, with normal info with wrong (ECDH) key",0,{},{}],["short derivedKey, empty salt, SHA-384, with empty info",0,{},{}],["short derivedKey, empty salt, SHA-384, with empty info with 0 length",1,"assert_equals: deriveBits with 0 length correctly threw OperationError: Data provided to an operation does not meet requirements expected \"OperationError\" but got \"DataError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:54:33\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:50:36\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:49:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-CBC length: 128 using short derivedKey, empty salt, SHA-384, with empty info",0,{},{}],["Derived key of type name: AES-CBC length: 128 using short derivedKey, empty salt, SHA-384, with empty info with bad hash name SHA384",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-CBC length: 128 using short derivedKey, empty salt, SHA-384, with empty info with missing deriveKey usage",0,{},{}],["Derived key of type name: AES-CBC length: 128 using short derivedKey, empty salt, SHA-384, with empty info with wrong (ECDH) key",0,{},{}],["Derived key of type name: AES-CBC length: 192 using short derivedKey, empty salt, SHA-384, with empty info",0,{},{}],["Derived key of type name: AES-CBC length: 192 using short derivedKey, empty salt, SHA-384, with empty info with bad hash name SHA384",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-CBC length: 192 using short derivedKey, empty salt, SHA-384, with empty info with missing deriveKey usage",0,{},{}],["Derived key of type name: AES-CBC length: 192 using short derivedKey, empty salt, SHA-384, with empty info with wrong (ECDH) key",0,{},{}],["Derived key of type name: AES-CBC length: 256 using short derivedKey, empty salt, SHA-384, with empty info",0,{},{}],["Derived key of type name: AES-CBC length: 256 using short derivedKey, empty salt, SHA-384, with empty info with bad hash name SHA384",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-CBC length: 256 using short derivedKey, empty salt, SHA-384, with empty info with missing deriveKey usage",0,{},{}],["Derived key of type name: AES-CBC length: 256 using short derivedKey, empty salt, SHA-384, with empty info with wrong (ECDH) key",0,{},{}],["Derived key of type name: AES-CTR length: 128 using short derivedKey, empty salt, SHA-384, with empty info",0,{},{}],["Derived key of type name: AES-CTR length: 128 using short derivedKey, empty salt, SHA-384, with empty info with bad hash name SHA384",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-CTR length: 128 using short derivedKey, empty salt, SHA-384, with empty info with missing deriveKey usage",0,{},{}],["Derived key of type name: AES-CTR length: 128 using short derivedKey, empty salt, SHA-384, with empty info with wrong (ECDH) key",0,{},{}],["Derived key of type name: AES-CTR length: 192 using short derivedKey, empty salt, SHA-384, with empty info",0,{},{}],["Derived key of type name: AES-CTR length: 192 using short derivedKey, empty salt, SHA-384, with empty info with bad hash name SHA384",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-CTR length: 192 using short derivedKey, empty salt, SHA-384, with empty info with missing deriveKey usage",0,{},{}],["Derived key of type name: AES-CTR length: 192 using short derivedKey, empty salt, SHA-384, with empty info with wrong (ECDH) key",0,{},{}],["Derived key of type name: AES-CTR length: 256 using short derivedKey, empty salt, SHA-384, with empty info",0,{},{}],["Derived key of type name: AES-CTR length: 256 using short derivedKey, empty salt, SHA-384, with empty info with bad hash name SHA384",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-CTR length: 256 using short derivedKey, empty salt, SHA-384, with empty info with missing deriveKey usage",0,{},{}],["Derived key of type name: AES-CTR length: 256 using short derivedKey, empty salt, SHA-384, with empty info with wrong (ECDH) key",0,{},{}],["Derived key of type name: AES-GCM length: 128 using short derivedKey, empty salt, SHA-384, with empty info",0,{},{}],["Derived key of type name: AES-GCM length: 128 using short derivedKey, empty salt, SHA-384, with empty info with bad hash name SHA384",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-GCM length: 128 using short derivedKey, empty salt, SHA-384, with empty info with missing deriveKey usage",0,{},{}],["Derived key of type name: AES-GCM length: 128 using short derivedKey, empty salt, SHA-384, with empty info with wrong (ECDH) key",0,{},{}],["Derived key of type name: AES-GCM length: 192 using short derivedKey, empty salt, SHA-384, with empty info",0,{},{}],["Derived key of type name: AES-GCM length: 192 using short derivedKey, empty salt, SHA-384, with empty info with bad hash name SHA384",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-GCM length: 192 using short derivedKey, empty salt, SHA-384, with empty info with missing deriveKey usage",0,{},{}],["Derived key of type name: AES-GCM length: 192 using short derivedKey, empty salt, SHA-384, with empty info with wrong (ECDH) key",0,{},{}],["Derived key of type name: AES-GCM length: 256 using short derivedKey, empty salt, SHA-384, with empty info",0,{},{}],["Derived key of type name: AES-GCM length: 256 using short derivedKey, empty salt, SHA-384, with empty info with bad hash name SHA384",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-GCM length: 256 using short derivedKey, empty salt, SHA-384, with empty info with missing deriveKey usage",0,{},{}],["Derived key of type name: AES-GCM length: 256 using short derivedKey, empty salt, SHA-384, with empty info with wrong (ECDH) key",0,{},{}],["Derived key of type name: AES-KW length: 128 using short derivedKey, empty salt, SHA-384, with empty info",0,{},{}],["Derived key of type name: AES-KW length: 128 using short derivedKey, empty salt, SHA-384, with empty info with bad hash name SHA384",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-KW length: 128 using short derivedKey, empty salt, SHA-384, with empty info with missing deriveKey usage",0,{},{}],["Derived key of type name: AES-KW length: 128 using short derivedKey, empty salt, SHA-384, with empty info with wrong (ECDH) key",0,{},{}],["Derived key of type name: AES-KW length: 192 using short derivedKey, empty salt, SHA-384, with empty info",0,{},{}],["Derived key of type name: AES-KW length: 192 using short derivedKey, empty salt, SHA-384, with empty info with bad hash name SHA384",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-KW length: 192 using short derivedKey, empty salt, SHA-384, with empty info with missing deriveKey usage",0,{},{}],["Derived key of type name: AES-KW length: 192 using short derivedKey, empty salt, SHA-384, with empty info with wrong (ECDH) key",0,{},{}],["Derived key of type name: AES-KW length: 256 using short derivedKey, empty salt, SHA-384, with empty info",0,{},{}],["Derived key of type name: AES-KW length: 256 using short derivedKey, empty salt, SHA-384, with empty info with bad hash name SHA384",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-KW length: 256 using short derivedKey, empty salt, SHA-384, with empty info with missing deriveKey usage",0,{},{}],["Derived key of type name: AES-KW length: 256 using short derivedKey, empty salt, SHA-384, with empty info with wrong (ECDH) key",0,{},{}],["Derived key of type name: HMAC hash: SHA-1 length: 256 using short derivedKey, empty salt, SHA-384, with empty info",0,{},{}],["Derived key of type name: HMAC hash: SHA-1 length: 256 using short derivedKey, empty salt, SHA-384, with empty info with bad hash name SHA384",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: HMAC hash: SHA-1 length: 256 using short derivedKey, empty salt, SHA-384, with empty info with missing deriveKey usage",0,{},{}],["Derived key of type name: HMAC hash: SHA-1 length: 256 using short derivedKey, empty salt, SHA-384, with empty info with wrong (ECDH) key",0,{},{}],["Derived key of type name: HMAC hash: SHA-256 length: 256 using short derivedKey, empty salt, SHA-384, with empty info",0,{},{}],["Derived key of type name: HMAC hash: SHA-256 length: 256 using short derivedKey, empty salt, SHA-384, with empty info with bad hash name SHA384",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: HMAC hash: SHA-256 length: 256 using short derivedKey, empty salt, SHA-384, with empty info with missing deriveKey usage",0,{},{}],["Derived key of type name: HMAC hash: SHA-256 length: 256 using short derivedKey, empty salt, SHA-384, with empty info with wrong (ECDH) key",0,{},{}],["Derived key of type name: HMAC hash: SHA-384 length: 256 using short derivedKey, empty salt, SHA-384, with empty info",0,{},{}],["Derived key of type name: HMAC hash: SHA-384 length: 256 using short derivedKey, empty salt, SHA-384, with empty info with bad hash name SHA384",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: HMAC hash: SHA-384 length: 256 using short derivedKey, empty salt, SHA-384, with empty info with missing deriveKey usage",0,{},{}],["Derived key of type name: HMAC hash: SHA-384 length: 256 using short derivedKey, empty salt, SHA-384, with empty info with wrong (ECDH) key",0,{},{}],["Derived key of type name: HMAC hash: SHA-512 length: 256 using short derivedKey, empty salt, SHA-384, with empty info",0,{},{}],["Derived key of type name: HMAC hash: SHA-512 length: 256 using short derivedKey, empty salt, SHA-384, with empty info with bad hash name SHA384",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: HMAC hash: SHA-512 length: 256 using short derivedKey, empty salt, SHA-384, with empty info with missing deriveKey usage",0,{},{}],["Derived key of type name: HMAC hash: SHA-512 length: 256 using short derivedKey, empty salt, SHA-384, with empty info with wrong (ECDH) key",0,{},{}],["short derivedKey, empty salt, SHA-384, with empty info with missing salt",1,"assert_equals: deriveBits missing salt correctly threw OperationError: An invalid or illegal string was specified expected \"TypeError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:128:33\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:124:36\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:123:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["short derivedKey, empty salt, SHA-384, with empty info with missing info",1,"assert_equals: deriveBits missing info correctly threw OperationError: An invalid or illegal string was specified expected \"TypeError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:138:33\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:134:36\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:133:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["short derivedKey, empty salt, SHA-384, with empty info with null length",1,"assert_equals: deriveBits with null length correctly threw OperationError: Data provided to an operation does not meet requirements expected \"TypeError\" but got \"DataError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:148:33\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:144:36\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:143:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["short derivedKey, empty salt, SHA-384, with empty info with non-multiple of 8 length",1,"assert_unreached: non-multiple of 8 length should have thrown an OperationError Reached unreachable code","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:156:33\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:154:36\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:153:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["short derivedKey, empty salt, SHA-384, with empty info with bad hash name SHA384",1,"assert_equals: deriveBits with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:170:33\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:166:36\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:164:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["short derivedKey, empty salt, SHA-384, with empty info with missing deriveBits usage",0,{},{}],["short derivedKey, empty salt, SHA-384, with empty info with wrong (ECDH) key",0,{},{}],["short derivedKey, empty salt, SHA-512, with normal info",0,{},{}],["short derivedKey, empty salt, SHA-512, with normal info with 0 length",1,"assert_equals: deriveBits with 0 length correctly threw OperationError: Data provided to an operation does not meet requirements expected \"OperationError\" but got \"DataError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:54:33\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:50:36\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:49:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-CBC length: 128 using short derivedKey, empty salt, SHA-512, with normal info",0,{},{}],["Derived key of type name: AES-CBC length: 128 using short derivedKey, empty salt, SHA-512, with normal info with bad hash name SHA512",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-CBC length: 128 using short derivedKey, empty salt, SHA-512, with normal info with missing deriveKey usage",0,{},{}],["Derived key of type name: AES-CBC length: 128 using short derivedKey, empty salt, SHA-512, with normal info with wrong (ECDH) key",0,{},{}],["Derived key of type name: AES-CBC length: 192 using short derivedKey, empty salt, SHA-512, with normal info",0,{},{}],["Derived key of type name: AES-CBC length: 192 using short derivedKey, empty salt, SHA-512, with normal info with bad hash name SHA512",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-CBC length: 192 using short derivedKey, empty salt, SHA-512, with normal info with missing deriveKey usage",0,{},{}],["Derived key of type name: AES-CBC length: 192 using short derivedKey, empty salt, SHA-512, with normal info with wrong (ECDH) key",0,{},{}],["Derived key of type name: AES-CBC length: 256 using short derivedKey, empty salt, SHA-512, with normal info",0,{},{}],["Derived key of type name: AES-CBC length: 256 using short derivedKey, empty salt, SHA-512, with normal info with bad hash name SHA512",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-CBC length: 256 using short derivedKey, empty salt, SHA-512, with normal info with missing deriveKey usage",0,{},{}],["Derived key of type name: AES-CBC length: 256 using short derivedKey, empty salt, SHA-512, with normal info with wrong (ECDH) key",0,{},{}],["Derived key of type name: AES-CTR length: 128 using short derivedKey, empty salt, SHA-512, with normal info",0,{},{}],["Derived key of type name: AES-CTR length: 128 using short derivedKey, empty salt, SHA-512, with normal info with bad hash name SHA512",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-CTR length: 128 using short derivedKey, empty salt, SHA-512, with normal info with missing deriveKey usage",0,{},{}],["Derived key of type name: AES-CTR length: 128 using short derivedKey, empty salt, SHA-512, with normal info with wrong (ECDH) key",0,{},{}],["Derived key of type name: AES-CTR length: 192 using short derivedKey, empty salt, SHA-512, with normal info",0,{},{}],["Derived key of type name: AES-CTR length: 192 using short derivedKey, empty salt, SHA-512, with normal info with bad hash name SHA512",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-CTR length: 192 using short derivedKey, empty salt, SHA-512, with normal info with missing deriveKey usage",0,{},{}],["Derived key of type name: AES-CTR length: 192 using short derivedKey, empty salt, SHA-512, with normal info with wrong (ECDH) key",0,{},{}],["Derived key of type name: AES-CTR length: 256 using short derivedKey, empty salt, SHA-512, with normal info",0,{},{}],["Derived key of type name: AES-CTR length: 256 using short derivedKey, empty salt, SHA-512, with normal info with bad hash name SHA512",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-CTR length: 256 using short derivedKey, empty salt, SHA-512, with normal info with missing deriveKey usage",0,{},{}],["Derived key of type name: AES-CTR length: 256 using short derivedKey, empty salt, SHA-512, with normal info with wrong (ECDH) key",0,{},{}],["Derived key of type name: AES-GCM length: 128 using short derivedKey, empty salt, SHA-512, with normal info",0,{},{}],["Derived key of type name: AES-GCM length: 128 using short derivedKey, empty salt, SHA-512, with normal info with bad hash name SHA512",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-GCM length: 128 using short derivedKey, empty salt, SHA-512, with normal info with missing deriveKey usage",0,{},{}],["Derived key of type name: AES-GCM length: 128 using short derivedKey, empty salt, SHA-512, with normal info with wrong (ECDH) key",0,{},{}],["Derived key of type name: AES-GCM length: 192 using short derivedKey, empty salt, SHA-512, with normal info",0,{},{}],["Derived key of type name: AES-GCM length: 192 using short derivedKey, empty salt, SHA-512, with normal info with bad hash name SHA512",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-GCM length: 192 using short derivedKey, empty salt, SHA-512, with normal info with missing deriveKey usage",0,{},{}],["Derived key of type name: AES-GCM length: 192 using short derivedKey, empty salt, SHA-512, with normal info with wrong (ECDH) key",0,{},{}],["Derived key of type name: AES-GCM length: 256 using short derivedKey, empty salt, SHA-512, with normal info",0,{},{}],["Derived key of type name: AES-GCM length: 256 using short derivedKey, empty salt, SHA-512, with normal info with bad hash name SHA512",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-GCM length: 256 using short derivedKey, empty salt, SHA-512, with normal info with missing deriveKey usage",0,{},{}],["Derived key of type name: AES-GCM length: 256 using short derivedKey, empty salt, SHA-512, with normal info with wrong (ECDH) key",0,{},{}],["Derived key of type name: AES-KW length: 128 using short derivedKey, empty salt, SHA-512, with normal info",0,{},{}],["Derived key of type name: AES-KW length: 128 using short derivedKey, empty salt, SHA-512, with normal info with bad hash name SHA512",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-KW length: 128 using short derivedKey, empty salt, SHA-512, with normal info with missing deriveKey usage",0,{},{}],["Derived key of type name: AES-KW length: 128 using short derivedKey, empty salt, SHA-512, with normal info with wrong (ECDH) key",0,{},{}],["Derived key of type name: AES-KW length: 192 using short derivedKey, empty salt, SHA-512, with normal info",0,{},{}],["Derived key of type name: AES-KW length: 192 using short derivedKey, empty salt, SHA-512, with normal info with bad hash name SHA512",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-KW length: 192 using short derivedKey, empty salt, SHA-512, with normal info with missing deriveKey usage",0,{},{}],["Derived key of type name: AES-KW length: 192 using short derivedKey, empty salt, SHA-512, with normal info with wrong (ECDH) key",0,{},{}],["Derived key of type name: AES-KW length: 256 using short derivedKey, empty salt, SHA-512, with normal info",0,{},{}],["Derived key of type name: AES-KW length: 256 using short derivedKey, empty salt, SHA-512, with normal info with bad hash name SHA512",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-KW length: 256 using short derivedKey, empty salt, SHA-512, with normal info with missing deriveKey usage",0,{},{}],["Derived key of type name: AES-KW length: 256 using short derivedKey, empty salt, SHA-512, with normal info with wrong (ECDH) key",0,{},{}],["Derived key of type name: HMAC hash: SHA-1 length: 256 using short derivedKey, empty salt, SHA-512, with normal info",0,{},{}],["Derived key of type name: HMAC hash: SHA-1 length: 256 using short derivedKey, empty salt, SHA-512, with normal info with bad hash name SHA512",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: HMAC hash: SHA-1 length: 256 using short derivedKey, empty salt, SHA-512, with normal info with missing deriveKey usage",0,{},{}],["Derived key of type name: HMAC hash: SHA-1 length: 256 using short derivedKey, empty salt, SHA-512, with normal info with wrong (ECDH) key",0,{},{}],["Derived key of type name: HMAC hash: SHA-256 length: 256 using short derivedKey, empty salt, SHA-512, with normal info",0,{},{}],["Derived key of type name: HMAC hash: SHA-256 length: 256 using short derivedKey, empty salt, SHA-512, with normal info with bad hash name SHA512",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: HMAC hash: SHA-256 length: 256 using short derivedKey, empty salt, SHA-512, with normal info with missing deriveKey usage",0,{},{}],["Derived key of type name: HMAC hash: SHA-256 length: 256 using short derivedKey, empty salt, SHA-512, with normal info with wrong (ECDH) key",0,{},{}],["Derived key of type name: HMAC hash: SHA-384 length: 256 using short derivedKey, empty salt, SHA-512, with normal info",0,{},{}],["Derived key of type name: HMAC hash: SHA-384 length: 256 using short derivedKey, empty salt, SHA-512, with normal info with bad hash name SHA512",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: HMAC hash: SHA-384 length: 256 using short derivedKey, empty salt, SHA-512, with normal info with missing deriveKey usage",0,{},{}],["Derived key of type name: HMAC hash: SHA-384 length: 256 using short derivedKey, empty salt, SHA-512, with normal info with wrong (ECDH) key",0,{},{}],["Derived key of type name: HMAC hash: SHA-512 length: 256 using short derivedKey, empty salt, SHA-512, with normal info",0,{},{}],["Derived key of type name: HMAC hash: SHA-512 length: 256 using short derivedKey, empty salt, SHA-512, with normal info with bad hash name SHA512",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: HMAC hash: SHA-512 length: 256 using short derivedKey, empty salt, SHA-512, with normal info with missing deriveKey usage",0,{},{}],["Derived key of type name: HMAC hash: SHA-512 length: 256 using short derivedKey, empty salt, SHA-512, with normal info with wrong (ECDH) key",0,{},{}],["short derivedKey, empty salt, SHA-512, with normal info with missing salt",1,"assert_equals: deriveBits missing salt correctly threw OperationError: An invalid or illegal string was specified expected \"TypeError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:128:33\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:124:36\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:123:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["short derivedKey, empty salt, SHA-512, with normal info with missing info",1,"assert_equals: deriveBits missing info correctly threw OperationError: An invalid or illegal string was specified expected \"TypeError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:138:33\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:134:36\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:133:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["short derivedKey, empty salt, SHA-512, with normal info with null length",1,"assert_equals: deriveBits with null length correctly threw OperationError: Data provided to an operation does not meet requirements expected \"TypeError\" but got \"DataError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:148:33\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:144:36\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:143:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["short derivedKey, empty salt, SHA-512, with normal info with non-multiple of 8 length",1,"assert_unreached: non-multiple of 8 length should have thrown an OperationError Reached unreachable code","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:156:33\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:154:36\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:153:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["short derivedKey, empty salt, SHA-512, with normal info with bad hash name SHA512",1,"assert_equals: deriveBits with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:170:33\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:166:36\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:164:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["short derivedKey, empty salt, SHA-512, with normal info with missing deriveBits usage",0,{},{}],["short derivedKey, empty salt, SHA-512, with normal info with wrong (ECDH) key",0,{},{}],["short derivedKey, empty salt, SHA-512, with empty info",0,{},{}],["short derivedKey, empty salt, SHA-512, with empty info with 0 length",1,"assert_equals: deriveBits with 0 length correctly threw OperationError: Data provided to an operation does not meet requirements expected \"OperationError\" but got \"DataError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:54:33\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:50:36\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:49:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-CBC length: 128 using short derivedKey, empty salt, SHA-512, with empty info",0,{},{}],["Derived key of type name: AES-CBC length: 128 using short derivedKey, empty salt, SHA-512, with empty info with bad hash name SHA512",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-CBC length: 128 using short derivedKey, empty salt, SHA-512, with empty info with missing deriveKey usage",0,{},{}],["Derived key of type name: AES-CBC length: 128 using short derivedKey, empty salt, SHA-512, with empty info with wrong (ECDH) key",0,{},{}],["Derived key of type name: AES-CBC length: 192 using short derivedKey, empty salt, SHA-512, with empty info",0,{},{}],["Derived key of type name: AES-CBC length: 192 using short derivedKey, empty salt, SHA-512, with empty info with bad hash name SHA512",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-CBC length: 192 using short derivedKey, empty salt, SHA-512, with empty info with missing deriveKey usage",0,{},{}],["Derived key of type name: AES-CBC length: 192 using short derivedKey, empty salt, SHA-512, with empty info with wrong (ECDH) key",0,{},{}],["Derived key of type name: AES-CBC length: 256 using short derivedKey, empty salt, SHA-512, with empty info",0,{},{}],["Derived key of type name: AES-CBC length: 256 using short derivedKey, empty salt, SHA-512, with empty info with bad hash name SHA512",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-CBC length: 256 using short derivedKey, empty salt, SHA-512, with empty info with missing deriveKey usage",0,{},{}],["Derived key of type name: AES-CBC length: 256 using short derivedKey, empty salt, SHA-512, with empty info with wrong (ECDH) key",0,{},{}],["Derived key of type name: AES-CTR length: 128 using short derivedKey, empty salt, SHA-512, with empty info",0,{},{}],["Derived key of type name: AES-CTR length: 128 using short derivedKey, empty salt, SHA-512, with empty info with bad hash name SHA512",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-CTR length: 128 using short derivedKey, empty salt, SHA-512, with empty info with missing deriveKey usage",0,{},{}],["Derived key of type name: AES-CTR length: 128 using short derivedKey, empty salt, SHA-512, with empty info with wrong (ECDH) key",0,{},{}],["Derived key of type name: AES-CTR length: 192 using short derivedKey, empty salt, SHA-512, with empty info",0,{},{}],["Derived key of type name: AES-CTR length: 192 using short derivedKey, empty salt, SHA-512, with empty info with bad hash name SHA512",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-CTR length: 192 using short derivedKey, empty salt, SHA-512, with empty info with missing deriveKey usage",0,{},{}],["Derived key of type name: AES-CTR length: 192 using short derivedKey, empty salt, SHA-512, with empty info with wrong (ECDH) key",0,{},{}],["Derived key of type name: AES-CTR length: 256 using short derivedKey, empty salt, SHA-512, with empty info",0,{},{}],["Derived key of type name: AES-CTR length: 256 using short derivedKey, empty salt, SHA-512, with empty info with bad hash name SHA512",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-CTR length: 256 using short derivedKey, empty salt, SHA-512, with empty info with missing deriveKey usage",0,{},{}],["Derived key of type name: AES-CTR length: 256 using short derivedKey, empty salt, SHA-512, with empty info with wrong (ECDH) key",0,{},{}],["Derived key of type name: AES-GCM length: 128 using short derivedKey, empty salt, SHA-512, with empty info",0,{},{}],["Derived key of type name: AES-GCM length: 128 using short derivedKey, empty salt, SHA-512, with empty info with bad hash name SHA512",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-GCM length: 128 using short derivedKey, empty salt, SHA-512, with empty info with missing deriveKey usage",0,{},{}],["Derived key of type name: AES-GCM length: 128 using short derivedKey, empty salt, SHA-512, with empty info with wrong (ECDH) key",0,{},{}],["Derived key of type name: AES-GCM length: 192 using short derivedKey, empty salt, SHA-512, with empty info",0,{},{}],["Derived key of type name: AES-GCM length: 192 using short derivedKey, empty salt, SHA-512, with empty info with bad hash name SHA512",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-GCM length: 192 using short derivedKey, empty salt, SHA-512, with empty info with missing deriveKey usage",0,{},{}],["Derived key of type name: AES-GCM length: 192 using short derivedKey, empty salt, SHA-512, with empty info with wrong (ECDH) key",0,{},{}],["Derived key of type name: AES-GCM length: 256 using short derivedKey, empty salt, SHA-512, with empty info",0,{},{}],["Derived key of type name: AES-GCM length: 256 using short derivedKey, empty salt, SHA-512, with empty info with bad hash name SHA512",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-GCM length: 256 using short derivedKey, empty salt, SHA-512, with empty info with missing deriveKey usage",0,{},{}],["Derived key of type name: AES-GCM length: 256 using short derivedKey, empty salt, SHA-512, with empty info with wrong (ECDH) key",0,{},{}],["Derived key of type name: AES-KW length: 128 using short derivedKey, empty salt, SHA-512, with empty info",0,{},{}],["Derived key of type name: AES-KW length: 128 using short derivedKey, empty salt, SHA-512, with empty info with bad hash name SHA512",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-KW length: 128 using short derivedKey, empty salt, SHA-512, with empty info with missing deriveKey usage",0,{},{}],["Derived key of type name: AES-KW length: 128 using short derivedKey, empty salt, SHA-512, with empty info with wrong (ECDH) key",0,{},{}],["Derived key of type name: AES-KW length: 192 using short derivedKey, empty salt, SHA-512, with empty info",0,{},{}],["Derived key of type name: AES-KW length: 192 using short derivedKey, empty salt, SHA-512, with empty info with bad hash name SHA512",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-KW length: 192 using short derivedKey, empty salt, SHA-512, with empty info with missing deriveKey usage",0,{},{}],["Derived key of type name: AES-KW length: 192 using short derivedKey, empty salt, SHA-512, with empty info with wrong (ECDH) key",0,{},{}],["Derived key of type name: AES-KW length: 256 using short derivedKey, empty salt, SHA-512, with empty info",0,{},{}],["Derived key of type name: AES-KW length: 256 using short derivedKey, empty salt, SHA-512, with empty info with bad hash name SHA512",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-KW length: 256 using short derivedKey, empty salt, SHA-512, with empty info with missing deriveKey usage",0,{},{}],["Derived key of type name: AES-KW length: 256 using short derivedKey, empty salt, SHA-512, with empty info with wrong (ECDH) key",0,{},{}],["Derived key of type name: HMAC hash: SHA-1 length: 256 using short derivedKey, empty salt, SHA-512, with empty info",0,{},{}],["Derived key of type name: HMAC hash: SHA-1 length: 256 using short derivedKey, empty salt, SHA-512, with empty info with bad hash name SHA512",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: HMAC hash: SHA-1 length: 256 using short derivedKey, empty salt, SHA-512, with empty info with missing deriveKey usage",0,{},{}],["Derived key of type name: HMAC hash: SHA-1 length: 256 using short derivedKey, empty salt, SHA-512, with empty info with wrong (ECDH) key",0,{},{}],["Derived key of type name: HMAC hash: SHA-256 length: 256 using short derivedKey, empty salt, SHA-512, with empty info",0,{},{}],["Derived key of type name: HMAC hash: SHA-256 length: 256 using short derivedKey, empty salt, SHA-512, with empty info with bad hash name SHA512",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: HMAC hash: SHA-256 length: 256 using short derivedKey, empty salt, SHA-512, with empty info with missing deriveKey usage",0,{},{}],["Derived key of type name: HMAC hash: SHA-256 length: 256 using short derivedKey, empty salt, SHA-512, with empty info with wrong (ECDH) key",0,{},{}],["Derived key of type name: HMAC hash: SHA-384 length: 256 using short derivedKey, empty salt, SHA-512, with empty info",0,{},{}],["Derived key of type name: HMAC hash: SHA-384 length: 256 using short derivedKey, empty salt, SHA-512, with empty info with bad hash name SHA512",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: HMAC hash: SHA-384 length: 256 using short derivedKey, empty salt, SHA-512, with empty info with missing deriveKey usage",0,{},{}],["Derived key of type name: HMAC hash: SHA-384 length: 256 using short derivedKey, empty salt, SHA-512, with empty info with wrong (ECDH) key",0,{},{}],["Derived key of type name: HMAC hash: SHA-512 length: 256 using short derivedKey, empty salt, SHA-512, with empty info",0,{},{}],["Derived key of type name: HMAC hash: SHA-512 length: 256 using short derivedKey, empty salt, SHA-512, with empty info with bad hash name SHA512",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: HMAC hash: SHA-512 length: 256 using short derivedKey, empty salt, SHA-512, with empty info with missing deriveKey usage",0,{},{}],["Derived key of type name: HMAC hash: SHA-512 length: 256 using short derivedKey, empty salt, SHA-512, with empty info with wrong (ECDH) key",0,{},{}],["short derivedKey, empty salt, SHA-512, with empty info with missing salt",1,"assert_equals: deriveBits missing salt correctly threw OperationError: An invalid or illegal string was specified expected \"TypeError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:128:33\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:124:36\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:123:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["short derivedKey, empty salt, SHA-512, with empty info with missing info",1,"assert_equals: deriveBits missing info correctly threw OperationError: An invalid or illegal string was specified expected \"TypeError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:138:33\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:134:36\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:133:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["short derivedKey, empty salt, SHA-512, with empty info with null length",1,"assert_equals: deriveBits with null length correctly threw OperationError: Data provided to an operation does not meet requirements expected \"TypeError\" but got \"DataError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:148:33\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:144:36\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:143:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["short derivedKey, empty salt, SHA-512, with empty info with non-multiple of 8 length",1,"assert_unreached: non-multiple of 8 length should have thrown an OperationError Reached unreachable code","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:156:33\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:154:36\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:153:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["short derivedKey, empty salt, SHA-512, with empty info with bad hash name SHA512",1,"assert_equals: deriveBits with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:170:33\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:166:36\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:164:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["short derivedKey, empty salt, SHA-512, with empty info with missing deriveBits usage",0,{},{}],["short derivedKey, empty salt, SHA-512, with empty info with wrong (ECDH) key",0,{},{}],["short derivedKey, empty salt, SHA-1, with normal info",0,{},{}],["short derivedKey, empty salt, SHA-1, with normal info with 0 length",1,"assert_equals: deriveBits with 0 length correctly threw OperationError: Data provided to an operation does not meet requirements expected \"OperationError\" but got \"DataError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:54:33\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:50:36\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:49:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-CBC length: 128 using short derivedKey, empty salt, SHA-1, with normal info",0,{},{}],["Derived key of type name: AES-CBC length: 128 using short derivedKey, empty salt, SHA-1, with normal info with bad hash name SHA1",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-CBC length: 128 using short derivedKey, empty salt, SHA-1, with normal info with missing deriveKey usage",0,{},{}],["Derived key of type name: AES-CBC length: 128 using short derivedKey, empty salt, SHA-1, with normal info with wrong (ECDH) key",0,{},{}],["Derived key of type name: AES-CBC length: 192 using short derivedKey, empty salt, SHA-1, with normal info",0,{},{}],["Derived key of type name: AES-CBC length: 192 using short derivedKey, empty salt, SHA-1, with normal info with bad hash name SHA1",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-CBC length: 192 using short derivedKey, empty salt, SHA-1, with normal info with missing deriveKey usage",0,{},{}],["Derived key of type name: AES-CBC length: 192 using short derivedKey, empty salt, SHA-1, with normal info with wrong (ECDH) key",0,{},{}],["Derived key of type name: AES-CBC length: 256 using short derivedKey, empty salt, SHA-1, with normal info",0,{},{}],["Derived key of type name: AES-CBC length: 256 using short derivedKey, empty salt, SHA-1, with normal info with bad hash name SHA1",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-CBC length: 256 using short derivedKey, empty salt, SHA-1, with normal info with missing deriveKey usage",0,{},{}],["Derived key of type name: AES-CBC length: 256 using short derivedKey, empty salt, SHA-1, with normal info with wrong (ECDH) key",0,{},{}],["Derived key of type name: AES-CTR length: 128 using short derivedKey, empty salt, SHA-1, with normal info",0,{},{}],["Derived key of type name: AES-CTR length: 128 using short derivedKey, empty salt, SHA-1, with normal info with bad hash name SHA1",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-CTR length: 128 using short derivedKey, empty salt, SHA-1, with normal info with missing deriveKey usage",0,{},{}],["Derived key of type name: AES-CTR length: 128 using short derivedKey, empty salt, SHA-1, with normal info with wrong (ECDH) key",0,{},{}],["Derived key of type name: AES-CTR length: 192 using short derivedKey, empty salt, SHA-1, with normal info",0,{},{}],["Derived key of type name: AES-CTR length: 192 using short derivedKey, empty salt, SHA-1, with normal info with bad hash name SHA1",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-CTR length: 192 using short derivedKey, empty salt, SHA-1, with normal info with missing deriveKey usage",0,{},{}],["Derived key of type name: AES-CTR length: 192 using short derivedKey, empty salt, SHA-1, with normal info with wrong (ECDH) key",0,{},{}],["Derived key of type name: AES-CTR length: 256 using short derivedKey, empty salt, SHA-1, with normal info",0,{},{}],["Derived key of type name: AES-CTR length: 256 using short derivedKey, empty salt, SHA-1, with normal info with bad hash name SHA1",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-CTR length: 256 using short derivedKey, empty salt, SHA-1, with normal info with missing deriveKey usage",0,{},{}],["Derived key of type name: AES-CTR length: 256 using short derivedKey, empty salt, SHA-1, with normal info with wrong (ECDH) key",0,{},{}],["Derived key of type name: AES-GCM length: 128 using short derivedKey, empty salt, SHA-1, with normal info",0,{},{}],["Derived key of type name: AES-GCM length: 128 using short derivedKey, empty salt, SHA-1, with normal info with bad hash name SHA1",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-GCM length: 128 using short derivedKey, empty salt, SHA-1, with normal info with missing deriveKey usage",0,{},{}],["Derived key of type name: AES-GCM length: 128 using short derivedKey, empty salt, SHA-1, with normal info with wrong (ECDH) key",0,{},{}],["Derived key of type name: AES-GCM length: 192 using short derivedKey, empty salt, SHA-1, with normal info",0,{},{}],["Derived key of type name: AES-GCM length: 192 using short derivedKey, empty salt, SHA-1, with normal info with bad hash name SHA1",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-GCM length: 192 using short derivedKey, empty salt, SHA-1, with normal info with missing deriveKey usage",0,{},{}],["Derived key of type name: AES-GCM length: 192 using short derivedKey, empty salt, SHA-1, with normal info with wrong (ECDH) key",0,{},{}],["Derived key of type name: AES-GCM length: 256 using short derivedKey, empty salt, SHA-1, with normal info",0,{},{}],["Derived key of type name: AES-GCM length: 256 using short derivedKey, empty salt, SHA-1, with normal info with bad hash name SHA1",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-GCM length: 256 using short derivedKey, empty salt, SHA-1, with normal info with missing deriveKey usage",0,{},{}],["Derived key of type name: AES-GCM length: 256 using short derivedKey, empty salt, SHA-1, with normal info with wrong (ECDH) key",0,{},{}],["Derived key of type name: AES-KW length: 128 using short derivedKey, empty salt, SHA-1, with normal info",0,{},{}],["Derived key of type name: AES-KW length: 128 using short derivedKey, empty salt, SHA-1, with normal info with bad hash name SHA1",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-KW length: 128 using short derivedKey, empty salt, SHA-1, with normal info with missing deriveKey usage",0,{},{}],["Derived key of type name: AES-KW length: 128 using short derivedKey, empty salt, SHA-1, with normal info with wrong (ECDH) key",0,{},{}],["Derived key of type name: AES-KW length: 192 using short derivedKey, empty salt, SHA-1, with normal info",0,{},{}],["Derived key of type name: AES-KW length: 192 using short derivedKey, empty salt, SHA-1, with normal info with bad hash name SHA1",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-KW length: 192 using short derivedKey, empty salt, SHA-1, with normal info with missing deriveKey usage",0,{},{}],["Derived key of type name: AES-KW length: 192 using short derivedKey, empty salt, SHA-1, with normal info with wrong (ECDH) key",0,{},{}],["Derived key of type name: AES-KW length: 256 using short derivedKey, empty salt, SHA-1, with normal info",0,{},{}],["Derived key of type name: AES-KW length: 256 using short derivedKey, empty salt, SHA-1, with normal info with bad hash name SHA1",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-KW length: 256 using short derivedKey, empty salt, SHA-1, with normal info with missing deriveKey usage",0,{},{}],["Derived key of type name: AES-KW length: 256 using short derivedKey, empty salt, SHA-1, with normal info with wrong (ECDH) key",0,{},{}],["Derived key of type name: HMAC hash: SHA-1 length: 256 using short derivedKey, empty salt, SHA-1, with normal info",0,{},{}],["Derived key of type name: HMAC hash: SHA-1 length: 256 using short derivedKey, empty salt, SHA-1, with normal info with bad hash name SHA1",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: HMAC hash: SHA-1 length: 256 using short derivedKey, empty salt, SHA-1, with normal info with missing deriveKey usage",0,{},{}],["Derived key of type name: HMAC hash: SHA-1 length: 256 using short derivedKey, empty salt, SHA-1, with normal info with wrong (ECDH) key",0,{},{}],["Derived key of type name: HMAC hash: SHA-256 length: 256 using short derivedKey, empty salt, SHA-1, with normal info",0,{},{}],["Derived key of type name: HMAC hash: SHA-256 length: 256 using short derivedKey, empty salt, SHA-1, with normal info with bad hash name SHA1",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: HMAC hash: SHA-256 length: 256 using short derivedKey, empty salt, SHA-1, with normal info with missing deriveKey usage",0,{},{}],["Derived key of type name: HMAC hash: SHA-256 length: 256 using short derivedKey, empty salt, SHA-1, with normal info with wrong (ECDH) key",0,{},{}],["Derived key of type name: HMAC hash: SHA-384 length: 256 using short derivedKey, empty salt, SHA-1, with normal info",0,{},{}],["Derived key of type name: HMAC hash: SHA-384 length: 256 using short derivedKey, empty salt, SHA-1, with normal info with bad hash name SHA1",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: HMAC hash: SHA-384 length: 256 using short derivedKey, empty salt, SHA-1, with normal info with missing deriveKey usage",0,{},{}],["Derived key of type name: HMAC hash: SHA-384 length: 256 using short derivedKey, empty salt, SHA-1, with normal info with wrong (ECDH) key",0,{},{}],["Derived key of type name: HMAC hash: SHA-512 length: 256 using short derivedKey, empty salt, SHA-1, with normal info",0,{},{}],["Derived key of type name: HMAC hash: SHA-512 length: 256 using short derivedKey, empty salt, SHA-1, with normal info with bad hash name SHA1",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: HMAC hash: SHA-512 length: 256 using short derivedKey, empty salt, SHA-1, with normal info with missing deriveKey usage",0,{},{}],["Derived key of type name: HMAC hash: SHA-512 length: 256 using short derivedKey, empty salt, SHA-1, with normal info with wrong (ECDH) key",0,{},{}],["short derivedKey, empty salt, SHA-1, with normal info with missing salt",1,"assert_equals: deriveBits missing salt correctly threw OperationError: An invalid or illegal string was specified expected \"TypeError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:128:33\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:124:36\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:123:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["short derivedKey, empty salt, SHA-1, with normal info with missing info",1,"assert_equals: deriveBits missing info correctly threw OperationError: An invalid or illegal string was specified expected \"TypeError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:138:33\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:134:36\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:133:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["short derivedKey, empty salt, SHA-1, with normal info with null length",1,"assert_equals: deriveBits with null length correctly threw OperationError: Data provided to an operation does not meet requirements expected \"TypeError\" but got \"DataError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:148:33\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:144:36\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:143:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["short derivedKey, empty salt, SHA-1, with normal info with non-multiple of 8 length",1,"assert_unreached: non-multiple of 8 length should have thrown an OperationError Reached unreachable code","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:156:33\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:154:36\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:153:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["short derivedKey, empty salt, SHA-1, with normal info with bad hash name SHA1",1,"assert_equals: deriveBits with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:170:33\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:166:36\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:164:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["short derivedKey, empty salt, SHA-1, with normal info with missing deriveBits usage",0,{},{}],["short derivedKey, empty salt, SHA-1, with normal info with wrong (ECDH) key",0,{},{}],["short derivedKey, empty salt, SHA-1, with empty info",0,{},{}],["short derivedKey, empty salt, SHA-1, with empty info with 0 length",1,"assert_equals: deriveBits with 0 length correctly threw OperationError: Data provided to an operation does not meet requirements expected \"OperationError\" but got \"DataError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:54:33\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:50:36\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:49:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-CBC length: 128 using short derivedKey, empty salt, SHA-1, with empty info",0,{},{}],["Derived key of type name: AES-CBC length: 128 using short derivedKey, empty salt, SHA-1, with empty info with bad hash name SHA1",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-CBC length: 128 using short derivedKey, empty salt, SHA-1, with empty info with missing deriveKey usage",0,{},{}],["Derived key of type name: AES-CBC length: 128 using short derivedKey, empty salt, SHA-1, with empty info with wrong (ECDH) key",0,{},{}],["Derived key of type name: AES-CBC length: 192 using short derivedKey, empty salt, SHA-1, with empty info",0,{},{}],["Derived key of type name: AES-CBC length: 192 using short derivedKey, empty salt, SHA-1, with empty info with bad hash name SHA1",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-CBC length: 192 using short derivedKey, empty salt, SHA-1, with empty info with missing deriveKey usage",0,{},{}],["Derived key of type name: AES-CBC length: 192 using short derivedKey, empty salt, SHA-1, with empty info with wrong (ECDH) key",0,{},{}],["Derived key of type name: AES-CBC length: 256 using short derivedKey, empty salt, SHA-1, with empty info",0,{},{}],["Derived key of type name: AES-CBC length: 256 using short derivedKey, empty salt, SHA-1, with empty info with bad hash name SHA1",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-CBC length: 256 using short derivedKey, empty salt, SHA-1, with empty info with missing deriveKey usage",0,{},{}],["Derived key of type name: AES-CBC length: 256 using short derivedKey, empty salt, SHA-1, with empty info with wrong (ECDH) key",0,{},{}],["Derived key of type name: AES-CTR length: 128 using short derivedKey, empty salt, SHA-1, with empty info",0,{},{}],["Derived key of type name: AES-CTR length: 128 using short derivedKey, empty salt, SHA-1, with empty info with bad hash name SHA1",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-CTR length: 128 using short derivedKey, empty salt, SHA-1, with empty info with missing deriveKey usage",0,{},{}],["Derived key of type name: AES-CTR length: 128 using short derivedKey, empty salt, SHA-1, with empty info with wrong (ECDH) key",0,{},{}],["Derived key of type name: AES-CTR length: 192 using short derivedKey, empty salt, SHA-1, with empty info",0,{},{}],["Derived key of type name: AES-CTR length: 192 using short derivedKey, empty salt, SHA-1, with empty info with bad hash name SHA1",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-CTR length: 192 using short derivedKey, empty salt, SHA-1, with empty info with missing deriveKey usage",0,{},{}],["Derived key of type name: AES-CTR length: 192 using short derivedKey, empty salt, SHA-1, with empty info with wrong (ECDH) key",0,{},{}],["Derived key of type name: AES-CTR length: 256 using short derivedKey, empty salt, SHA-1, with empty info",0,{},{}],["Derived key of type name: AES-CTR length: 256 using short derivedKey, empty salt, SHA-1, with empty info with bad hash name SHA1",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-CTR length: 256 using short derivedKey, empty salt, SHA-1, with empty info with missing deriveKey usage",0,{},{}],["Derived key of type name: AES-CTR length: 256 using short derivedKey, empty salt, SHA-1, with empty info with wrong (ECDH) key",0,{},{}],["Derived key of type name: AES-GCM length: 128 using short derivedKey, empty salt, SHA-1, with empty info",0,{},{}],["Derived key of type name: AES-GCM length: 128 using short derivedKey, empty salt, SHA-1, with empty info with bad hash name SHA1",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-GCM length: 128 using short derivedKey, empty salt, SHA-1, with empty info with missing deriveKey usage",0,{},{}],["Derived key of type name: AES-GCM length: 128 using short derivedKey, empty salt, SHA-1, with empty info with wrong (ECDH) key",0,{},{}],["Derived key of type name: AES-GCM length: 192 using short derivedKey, empty salt, SHA-1, with empty info",0,{},{}],["Derived key of type name: AES-GCM length: 192 using short derivedKey, empty salt, SHA-1, with empty info with bad hash name SHA1",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-GCM length: 192 using short derivedKey, empty salt, SHA-1, with empty info with missing deriveKey usage",0,{},{}],["Derived key of type name: AES-GCM length: 192 using short derivedKey, empty salt, SHA-1, with empty info with wrong (ECDH) key",0,{},{}],["Derived key of type name: AES-GCM length: 256 using short derivedKey, empty salt, SHA-1, with empty info",0,{},{}],["Derived key of type name: AES-GCM length: 256 using short derivedKey, empty salt, SHA-1, with empty info with bad hash name SHA1",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-GCM length: 256 using short derivedKey, empty salt, SHA-1, with empty info with missing deriveKey usage",0,{},{}],["Derived key of type name: AES-GCM length: 256 using short derivedKey, empty salt, SHA-1, with empty info with wrong (ECDH) key",0,{},{}],["Derived key of type name: AES-KW length: 128 using short derivedKey, empty salt, SHA-1, with empty info",0,{},{}],["Derived key of type name: AES-KW length: 128 using short derivedKey, empty salt, SHA-1, with empty info with bad hash name SHA1",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-KW length: 128 using short derivedKey, empty salt, SHA-1, with empty info with missing deriveKey usage",0,{},{}],["Derived key of type name: AES-KW length: 128 using short derivedKey, empty salt, SHA-1, with empty info with wrong (ECDH) key",0,{},{}],["Derived key of type name: AES-KW length: 192 using short derivedKey, empty salt, SHA-1, with empty info",0,{},{}],["Derived key of type name: AES-KW length: 192 using short derivedKey, empty salt, SHA-1, with empty info with bad hash name SHA1",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-KW length: 192 using short derivedKey, empty salt, SHA-1, with empty info with missing deriveKey usage",0,{},{}],["Derived key of type name: AES-KW length: 192 using short derivedKey, empty salt, SHA-1, with empty info with wrong (ECDH) key",0,{},{}],["Derived key of type name: AES-KW length: 256 using short derivedKey, empty salt, SHA-1, with empty info",0,{},{}],["Derived key of type name: AES-KW length: 256 using short derivedKey, empty salt, SHA-1, with empty info with bad hash name SHA1",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-KW length: 256 using short derivedKey, empty salt, SHA-1, with empty info with missing deriveKey usage",0,{},{}],["Derived key of type name: AES-KW length: 256 using short derivedKey, empty salt, SHA-1, with empty info with wrong (ECDH) key",0,{},{}],["Derived key of type name: HMAC hash: SHA-1 length: 256 using short derivedKey, empty salt, SHA-1, with empty info",0,{},{}],["Derived key of type name: HMAC hash: SHA-1 length: 256 using short derivedKey, empty salt, SHA-1, with empty info with bad hash name SHA1",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: HMAC hash: SHA-1 length: 256 using short derivedKey, empty salt, SHA-1, with empty info with missing deriveKey usage",0,{},{}],["Derived key of type name: HMAC hash: SHA-1 length: 256 using short derivedKey, empty salt, SHA-1, with empty info with wrong (ECDH) key",0,{},{}],["Derived key of type name: HMAC hash: SHA-256 length: 256 using short derivedKey, empty salt, SHA-1, with empty info",0,{},{}],["Derived key of type name: HMAC hash: SHA-256 length: 256 using short derivedKey, empty salt, SHA-1, with empty info with bad hash name SHA1",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: HMAC hash: SHA-256 length: 256 using short derivedKey, empty salt, SHA-1, with empty info with missing deriveKey usage",0,{},{}],["Derived key of type name: HMAC hash: SHA-256 length: 256 using short derivedKey, empty salt, SHA-1, with empty info with wrong (ECDH) key",0,{},{}],["Derived key of type name: HMAC hash: SHA-384 length: 256 using short derivedKey, empty salt, SHA-1, with empty info",0,{},{}],["Derived key of type name: HMAC hash: SHA-384 length: 256 using short derivedKey, empty salt, SHA-1, with empty info with bad hash name SHA1",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: HMAC hash: SHA-384 length: 256 using short derivedKey, empty salt, SHA-1, with empty info with missing deriveKey usage",0,{},{}],["Derived key of type name: HMAC hash: SHA-384 length: 256 using short derivedKey, empty salt, SHA-1, with empty info with wrong (ECDH) key",0,{},{}],["Derived key of type name: HMAC hash: SHA-512 length: 256 using short derivedKey, empty salt, SHA-1, with empty info",0,{},{}],["Derived key of type name: HMAC hash: SHA-512 length: 256 using short derivedKey, empty salt, SHA-1, with empty info with bad hash name SHA1",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: HMAC hash: SHA-512 length: 256 using short derivedKey, empty salt, SHA-1, with empty info with missing deriveKey usage",0,{},{}],["Derived key of type name: HMAC hash: SHA-512 length: 256 using short derivedKey, empty salt, SHA-1, with empty info with wrong (ECDH) key",0,{},{}],["short derivedKey, empty salt, SHA-1, with empty info with missing salt",1,"assert_equals: deriveBits missing salt correctly threw OperationError: An invalid or illegal string was specified expected \"TypeError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:128:33\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:124:36\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:123:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["short derivedKey, empty salt, SHA-1, with empty info with missing info",1,"assert_equals: deriveBits missing info correctly threw OperationError: An invalid or illegal string was specified expected \"TypeError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:138:33\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:134:36\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:133:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["short derivedKey, empty salt, SHA-1, with empty info with null length",1,"assert_equals: deriveBits with null length correctly threw OperationError: Data provided to an operation does not meet requirements expected \"TypeError\" but got \"DataError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:148:33\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:144:36\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:143:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["short derivedKey, empty salt, SHA-1, with empty info with non-multiple of 8 length",1,"assert_unreached: non-multiple of 8 length should have thrown an OperationError Reached unreachable code","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:156:33\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:154:36\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:153:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["short derivedKey, empty salt, SHA-1, with empty info with bad hash name SHA1",1,"assert_equals: deriveBits with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:170:33\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:166:36\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:164:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["short derivedKey, empty salt, SHA-1, with empty info with missing deriveBits usage",0,{},{}],["short derivedKey, empty salt, SHA-1, with empty info with wrong (ECDH) key",0,{},{}],["short derivedKey, empty salt, SHA-256, with normal info",0,{},{}],["short derivedKey, empty salt, SHA-256, with normal info with 0 length",1,"assert_equals: deriveBits with 0 length correctly threw OperationError: Data provided to an operation does not meet requirements expected \"OperationError\" but got \"DataError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:54:33\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:50:36\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:49:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-CBC length: 128 using short derivedKey, empty salt, SHA-256, with normal info",0,{},{}],["Derived key of type name: AES-CBC length: 128 using short derivedKey, empty salt, SHA-256, with normal info with bad hash name SHA256",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-CBC length: 128 using short derivedKey, empty salt, SHA-256, with normal info with missing deriveKey usage",0,{},{}],["Derived key of type name: AES-CBC length: 128 using short derivedKey, empty salt, SHA-256, with normal info with wrong (ECDH) key",0,{},{}],["Derived key of type name: AES-CBC length: 192 using short derivedKey, empty salt, SHA-256, with normal info",0,{},{}],["Derived key of type name: AES-CBC length: 192 using short derivedKey, empty salt, SHA-256, with normal info with bad hash name SHA256",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-CBC length: 192 using short derivedKey, empty salt, SHA-256, with normal info with missing deriveKey usage",0,{},{}],["Derived key of type name: AES-CBC length: 192 using short derivedKey, empty salt, SHA-256, with normal info with wrong (ECDH) key",0,{},{}],["Derived key of type name: AES-CBC length: 256 using short derivedKey, empty salt, SHA-256, with normal info",0,{},{}],["Derived key of type name: AES-CBC length: 256 using short derivedKey, empty salt, SHA-256, with normal info with bad hash name SHA256",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-CBC length: 256 using short derivedKey, empty salt, SHA-256, with normal info with missing deriveKey usage",0,{},{}],["Derived key of type name: AES-CBC length: 256 using short derivedKey, empty salt, SHA-256, with normal info with wrong (ECDH) key",0,{},{}],["Derived key of type name: AES-CTR length: 128 using short derivedKey, empty salt, SHA-256, with normal info",0,{},{}],["Derived key of type name: AES-CTR length: 128 using short derivedKey, empty salt, SHA-256, with normal info with bad hash name SHA256",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-CTR length: 128 using short derivedKey, empty salt, SHA-256, with normal info with missing deriveKey usage",0,{},{}],["Derived key of type name: AES-CTR length: 128 using short derivedKey, empty salt, SHA-256, with normal info with wrong (ECDH) key",0,{},{}],["Derived key of type name: AES-CTR length: 192 using short derivedKey, empty salt, SHA-256, with normal info",0,{},{}],["Derived key of type name: AES-CTR length: 192 using short derivedKey, empty salt, SHA-256, with normal info with bad hash name SHA256",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-CTR length: 192 using short derivedKey, empty salt, SHA-256, with normal info with missing deriveKey usage",0,{},{}],["Derived key of type name: AES-CTR length: 192 using short derivedKey, empty salt, SHA-256, with normal info with wrong (ECDH) key",0,{},{}],["Derived key of type name: AES-CTR length: 256 using short derivedKey, empty salt, SHA-256, with normal info",0,{},{}],["Derived key of type name: AES-CTR length: 256 using short derivedKey, empty salt, SHA-256, with normal info with bad hash name SHA256",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-CTR length: 256 using short derivedKey, empty salt, SHA-256, with normal info with missing deriveKey usage",0,{},{}],["Derived key of type name: AES-CTR length: 256 using short derivedKey, empty salt, SHA-256, with normal info with wrong (ECDH) key",0,{},{}],["Derived key of type name: AES-GCM length: 128 using short derivedKey, empty salt, SHA-256, with normal info",0,{},{}],["Derived key of type name: AES-GCM length: 128 using short derivedKey, empty salt, SHA-256, with normal info with bad hash name SHA256",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-GCM length: 128 using short derivedKey, empty salt, SHA-256, with normal info with missing deriveKey usage",0,{},{}],["Derived key of type name: AES-GCM length: 128 using short derivedKey, empty salt, SHA-256, with normal info with wrong (ECDH) key",0,{},{}],["Derived key of type name: AES-GCM length: 192 using short derivedKey, empty salt, SHA-256, with normal info",0,{},{}],["Derived key of type name: AES-GCM length: 192 using short derivedKey, empty salt, SHA-256, with normal info with bad hash name SHA256",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-GCM length: 192 using short derivedKey, empty salt, SHA-256, with normal info with missing deriveKey usage",0,{},{}],["Derived key of type name: AES-GCM length: 192 using short derivedKey, empty salt, SHA-256, with normal info with wrong (ECDH) key",0,{},{}],["Derived key of type name: AES-GCM length: 256 using short derivedKey, empty salt, SHA-256, with normal info",0,{},{}],["Derived key of type name: AES-GCM length: 256 using short derivedKey, empty salt, SHA-256, with normal info with bad hash name SHA256",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-GCM length: 256 using short derivedKey, empty salt, SHA-256, with normal info with missing deriveKey usage",0,{},{}],["Derived key of type name: AES-GCM length: 256 using short derivedKey, empty salt, SHA-256, with normal info with wrong (ECDH) key",0,{},{}],["Derived key of type name: AES-KW length: 128 using short derivedKey, empty salt, SHA-256, with normal info",0,{},{}],["Derived key of type name: AES-KW length: 128 using short derivedKey, empty salt, SHA-256, with normal info with bad hash name SHA256",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-KW length: 128 using short derivedKey, empty salt, SHA-256, with normal info with missing deriveKey usage",0,{},{}],["Derived key of type name: AES-KW length: 128 using short derivedKey, empty salt, SHA-256, with normal info with wrong (ECDH) key",0,{},{}],["Derived key of type name: AES-KW length: 192 using short derivedKey, empty salt, SHA-256, with normal info",0,{},{}],["Derived key of type name: AES-KW length: 192 using short derivedKey, empty salt, SHA-256, with normal info with bad hash name SHA256",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-KW length: 192 using short derivedKey, empty salt, SHA-256, with normal info with missing deriveKey usage",0,{},{}],["Derived key of type name: AES-KW length: 192 using short derivedKey, empty salt, SHA-256, with normal info with wrong (ECDH) key",0,{},{}],["Derived key of type name: AES-KW length: 256 using short derivedKey, empty salt, SHA-256, with normal info",0,{},{}],["Derived key of type name: AES-KW length: 256 using short derivedKey, empty salt, SHA-256, with normal info with bad hash name SHA256",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-KW length: 256 using short derivedKey, empty salt, SHA-256, with normal info with missing deriveKey usage",0,{},{}],["Derived key of type name: AES-KW length: 256 using short derivedKey, empty salt, SHA-256, with normal info with wrong (ECDH) key",0,{},{}],["Derived key of type name: HMAC hash: SHA-1 length: 256 using short derivedKey, empty salt, SHA-256, with normal info",0,{},{}],["Derived key of type name: HMAC hash: SHA-1 length: 256 using short derivedKey, empty salt, SHA-256, with normal info with bad hash name SHA256",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: HMAC hash: SHA-1 length: 256 using short derivedKey, empty salt, SHA-256, with normal info with missing deriveKey usage",0,{},{}],["Derived key of type name: HMAC hash: SHA-1 length: 256 using short derivedKey, empty salt, SHA-256, with normal info with wrong (ECDH) key",0,{},{}],["Derived key of type name: HMAC hash: SHA-256 length: 256 using short derivedKey, empty salt, SHA-256, with normal info",0,{},{}],["Derived key of type name: HMAC hash: SHA-256 length: 256 using short derivedKey, empty salt, SHA-256, with normal info with bad hash name SHA256",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: HMAC hash: SHA-256 length: 256 using short derivedKey, empty salt, SHA-256, with normal info with missing deriveKey usage",0,{},{}],["Derived key of type name: HMAC hash: SHA-256 length: 256 using short derivedKey, empty salt, SHA-256, with normal info with wrong (ECDH) key",0,{},{}],["Derived key of type name: HMAC hash: SHA-384 length: 256 using short derivedKey, empty salt, SHA-256, with normal info",0,{},{}],["Derived key of type name: HMAC hash: SHA-384 length: 256 using short derivedKey, empty salt, SHA-256, with normal info with bad hash name SHA256",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: HMAC hash: SHA-384 length: 256 using short derivedKey, empty salt, SHA-256, with normal info with missing deriveKey usage",0,{},{}],["Derived key of type name: HMAC hash: SHA-384 length: 256 using short derivedKey, empty salt, SHA-256, with normal info with wrong (ECDH) key",0,{},{}],["Derived key of type name: HMAC hash: SHA-512 length: 256 using short derivedKey, empty salt, SHA-256, with normal info",0,{},{}],["Derived key of type name: HMAC hash: SHA-512 length: 256 using short derivedKey, empty salt, SHA-256, with normal info with bad hash name SHA256",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: HMAC hash: SHA-512 length: 256 using short derivedKey, empty salt, SHA-256, with normal info with missing deriveKey usage",0,{},{}],["Derived key of type name: HMAC hash: SHA-512 length: 256 using short derivedKey, empty salt, SHA-256, with normal info with wrong (ECDH) key",0,{},{}],["short derivedKey, empty salt, SHA-256, with normal info with missing salt",1,"assert_equals: deriveBits missing salt correctly threw OperationError: An invalid or illegal string was specified expected \"TypeError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:128:33\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:124:36\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:123:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["short derivedKey, empty salt, SHA-256, with normal info with missing info",1,"assert_equals: deriveBits missing info correctly threw OperationError: An invalid or illegal string was specified expected \"TypeError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:138:33\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:134:36\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:133:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["short derivedKey, empty salt, SHA-256, with normal info with null length",1,"assert_equals: deriveBits with null length correctly threw OperationError: Data provided to an operation does not meet requirements expected \"TypeError\" but got \"DataError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:148:33\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:144:36\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:143:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["short derivedKey, empty salt, SHA-256, with normal info with non-multiple of 8 length",1,"assert_unreached: non-multiple of 8 length should have thrown an OperationError Reached unreachable code","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:156:33\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:154:36\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:153:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["short derivedKey, empty salt, SHA-256, with normal info with bad hash name SHA256",1,"assert_equals: deriveBits with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:170:33\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:166:36\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:164:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["short derivedKey, empty salt, SHA-256, with normal info with missing deriveBits usage",0,{},{}],["short derivedKey, empty salt, SHA-256, with normal info with wrong (ECDH) key",0,{},{}],["short derivedKey, empty salt, SHA-256, with empty info",0,{},{}],["short derivedKey, empty salt, SHA-256, with empty info with 0 length",1,"assert_equals: deriveBits with 0 length correctly threw OperationError: Data provided to an operation does not meet requirements expected \"OperationError\" but got \"DataError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:54:33\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:50:36\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:49:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-CBC length: 128 using short derivedKey, empty salt, SHA-256, with empty info",0,{},{}],["Derived key of type name: AES-CBC length: 128 using short derivedKey, empty salt, SHA-256, with empty info with bad hash name SHA256",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-CBC length: 128 using short derivedKey, empty salt, SHA-256, with empty info with missing deriveKey usage",0,{},{}],["Derived key of type name: AES-CBC length: 128 using short derivedKey, empty salt, SHA-256, with empty info with wrong (ECDH) key",0,{},{}],["Derived key of type name: AES-CBC length: 192 using short derivedKey, empty salt, SHA-256, with empty info",0,{},{}],["Derived key of type name: AES-CBC length: 192 using short derivedKey, empty salt, SHA-256, with empty info with bad hash name SHA256",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-CBC length: 192 using short derivedKey, empty salt, SHA-256, with empty info with missing deriveKey usage",0,{},{}],["Derived key of type name: AES-CBC length: 192 using short derivedKey, empty salt, SHA-256, with empty info with wrong (ECDH) key",0,{},{}],["Derived key of type name: AES-CBC length: 256 using short derivedKey, empty salt, SHA-256, with empty info",0,{},{}],["Derived key of type name: AES-CBC length: 256 using short derivedKey, empty salt, SHA-256, with empty info with bad hash name SHA256",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-CBC length: 256 using short derivedKey, empty salt, SHA-256, with empty info with missing deriveKey usage",0,{},{}],["Derived key of type name: AES-CBC length: 256 using short derivedKey, empty salt, SHA-256, with empty info with wrong (ECDH) key",0,{},{}],["Derived key of type name: AES-CTR length: 128 using short derivedKey, empty salt, SHA-256, with empty info",0,{},{}],["Derived key of type name: AES-CTR length: 128 using short derivedKey, empty salt, SHA-256, with empty info with bad hash name SHA256",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-CTR length: 128 using short derivedKey, empty salt, SHA-256, with empty info with missing deriveKey usage",0,{},{}],["Derived key of type name: AES-CTR length: 128 using short derivedKey, empty salt, SHA-256, with empty info with wrong (ECDH) key",0,{},{}],["Derived key of type name: AES-CTR length: 192 using short derivedKey, empty salt, SHA-256, with empty info",0,{},{}],["Derived key of type name: AES-CTR length: 192 using short derivedKey, empty salt, SHA-256, with empty info with bad hash name SHA256",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-CTR length: 192 using short derivedKey, empty salt, SHA-256, with empty info with missing deriveKey usage",0,{},{}],["Derived key of type name: AES-CTR length: 192 using short derivedKey, empty salt, SHA-256, with empty info with wrong (ECDH) key",0,{},{}],["Derived key of type name: AES-CTR length: 256 using short derivedKey, empty salt, SHA-256, with empty info",0,{},{}],["Derived key of type name: AES-CTR length: 256 using short derivedKey, empty salt, SHA-256, with empty info with bad hash name SHA256",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-CTR length: 256 using short derivedKey, empty salt, SHA-256, with empty info with missing deriveKey usage",0,{},{}],["Derived key of type name: AES-CTR length: 256 using short derivedKey, empty salt, SHA-256, with empty info with wrong (ECDH) key",0,{},{}],["Derived key of type name: AES-GCM length: 128 using short derivedKey, empty salt, SHA-256, with empty info",0,{},{}],["Derived key of type name: AES-GCM length: 128 using short derivedKey, empty salt, SHA-256, with empty info with bad hash name SHA256",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-GCM length: 128 using short derivedKey, empty salt, SHA-256, with empty info with missing deriveKey usage",0,{},{}],["Derived key of type name: AES-GCM length: 128 using short derivedKey, empty salt, SHA-256, with empty info with wrong (ECDH) key",0,{},{}],["Derived key of type name: AES-GCM length: 192 using short derivedKey, empty salt, SHA-256, with empty info",0,{},{}],["Derived key of type name: AES-GCM length: 192 using short derivedKey, empty salt, SHA-256, with empty info with bad hash name SHA256",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-GCM length: 192 using short derivedKey, empty salt, SHA-256, with empty info with missing deriveKey usage",0,{},{}],["Derived key of type name: AES-GCM length: 192 using short derivedKey, empty salt, SHA-256, with empty info with wrong (ECDH) key",0,{},{}],["Derived key of type name: AES-GCM length: 256 using short derivedKey, empty salt, SHA-256, with empty info",0,{},{}],["Derived key of type name: AES-GCM length: 256 using short derivedKey, empty salt, SHA-256, with empty info with bad hash name SHA256",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-GCM length: 256 using short derivedKey, empty salt, SHA-256, with empty info with missing deriveKey usage",0,{},{}],["Derived key of type name: AES-GCM length: 256 using short derivedKey, empty salt, SHA-256, with empty info with wrong (ECDH) key",0,{},{}],["Derived key of type name: AES-KW length: 128 using short derivedKey, empty salt, SHA-256, with empty info",0,{},{}],["Derived key of type name: AES-KW length: 128 using short derivedKey, empty salt, SHA-256, with empty info with bad hash name SHA256",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-KW length: 128 using short derivedKey, empty salt, SHA-256, with empty info with missing deriveKey usage",0,{},{}],["Derived key of type name: AES-KW length: 128 using short derivedKey, empty salt, SHA-256, with empty info with wrong (ECDH) key",0,{},{}],["Derived key of type name: AES-KW length: 192 using short derivedKey, empty salt, SHA-256, with empty info",0,{},{}],["Derived key of type name: AES-KW length: 192 using short derivedKey, empty salt, SHA-256, with empty info with bad hash name SHA256",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-KW length: 192 using short derivedKey, empty salt, SHA-256, with empty info with missing deriveKey usage",0,{},{}],["Derived key of type name: AES-KW length: 192 using short derivedKey, empty salt, SHA-256, with empty info with wrong (ECDH) key",0,{},{}],["Derived key of type name: AES-KW length: 256 using short derivedKey, empty salt, SHA-256, with empty info",0,{},{}],["Derived key of type name: AES-KW length: 256 using short derivedKey, empty salt, SHA-256, with empty info with bad hash name SHA256",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-KW length: 256 using short derivedKey, empty salt, SHA-256, with empty info with missing deriveKey usage",0,{},{}],["Derived key of type name: AES-KW length: 256 using short derivedKey, empty salt, SHA-256, with empty info with wrong (ECDH) key",0,{},{}],["Derived key of type name: HMAC hash: SHA-1 length: 256 using short derivedKey, empty salt, SHA-256, with empty info",0,{},{}],["Derived key of type name: HMAC hash: SHA-1 length: 256 using short derivedKey, empty salt, SHA-256, with empty info with bad hash name SHA256",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: HMAC hash: SHA-1 length: 256 using short derivedKey, empty salt, SHA-256, with empty info with missing deriveKey usage",0,{},{}],["Derived key of type name: HMAC hash: SHA-1 length: 256 using short derivedKey, empty salt, SHA-256, with empty info with wrong (ECDH) key",0,{},{}],["Derived key of type name: HMAC hash: SHA-256 length: 256 using short derivedKey, empty salt, SHA-256, with empty info",0,{},{}],["Derived key of type name: HMAC hash: SHA-256 length: 256 using short derivedKey, empty salt, SHA-256, with empty info with bad hash name SHA256",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: HMAC hash: SHA-256 length: 256 using short derivedKey, empty salt, SHA-256, with empty info with missing deriveKey usage",0,{},{}],["Derived key of type name: HMAC hash: SHA-256 length: 256 using short derivedKey, empty salt, SHA-256, with empty info with wrong (ECDH) key",0,{},{}],["Derived key of type name: HMAC hash: SHA-384 length: 256 using short derivedKey, empty salt, SHA-256, with empty info",0,{},{}],["Derived key of type name: HMAC hash: SHA-384 length: 256 using short derivedKey, empty salt, SHA-256, with empty info with bad hash name SHA256",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: HMAC hash: SHA-384 length: 256 using short derivedKey, empty salt, SHA-256, with empty info with missing deriveKey usage",0,{},{}],["Derived key of type name: HMAC hash: SHA-384 length: 256 using short derivedKey, empty salt, SHA-256, with empty info with wrong (ECDH) key",0,{},{}],["Derived key of type name: HMAC hash: SHA-512 length: 256 using short derivedKey, empty salt, SHA-256, with empty info",0,{},{}],["Derived key of type name: HMAC hash: SHA-512 length: 256 using short derivedKey, empty salt, SHA-256, with empty info with bad hash name SHA256",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: HMAC hash: SHA-512 length: 256 using short derivedKey, empty salt, SHA-256, with empty info with missing deriveKey usage",0,{},{}],["Derived key of type name: HMAC hash: SHA-512 length: 256 using short derivedKey, empty salt, SHA-256, with empty info with wrong (ECDH) key",0,{},{}],["short derivedKey, empty salt, SHA-256, with empty info with missing salt",1,"assert_equals: deriveBits missing salt correctly threw OperationError: An invalid or illegal string was specified expected \"TypeError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:128:33\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:124:36\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:123:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["short derivedKey, empty salt, SHA-256, with empty info with missing info",1,"assert_equals: deriveBits missing info correctly threw OperationError: An invalid or illegal string was specified expected \"TypeError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:138:33\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:134:36\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:133:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["short derivedKey, empty salt, SHA-256, with empty info with null length",1,"assert_equals: deriveBits with null length correctly threw OperationError: Data provided to an operation does not meet requirements expected \"TypeError\" but got \"DataError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:148:33\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:144:36\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:143:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["short derivedKey, empty salt, SHA-256, with empty info with non-multiple of 8 length",1,"assert_unreached: non-multiple of 8 length should have thrown an OperationError Reached unreachable code","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:156:33\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:154:36\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:153:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["short derivedKey, empty salt, SHA-256, with empty info with bad hash name SHA256",1,"assert_equals: deriveBits with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:170:33\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:166:36\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:164:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["short derivedKey, empty salt, SHA-256, with empty info with missing deriveBits usage",0,{},{}],["short derivedKey, empty salt, SHA-256, with empty info with wrong (ECDH) key",0,{},{}],["short derivedKey, empty salt, PBKDF2, with normal info with non-digest algorithm PBKDF2",0,{},{}],["Derived key of type name: AES-CBC length: 128 using short derivedKey, empty salt, PBKDF2, with normal info",0,{},{}],["Derived key of type name: AES-CBC length: 192 using short derivedKey, empty salt, PBKDF2, with normal info",0,{},{}],["Derived key of type name: AES-CBC length: 256 using short derivedKey, empty salt, PBKDF2, with normal info",0,{},{}],["Derived key of type name: AES-CTR length: 128 using short derivedKey, empty salt, PBKDF2, with normal info",0,{},{}],["Derived key of type name: AES-CTR length: 192 using short derivedKey, empty salt, PBKDF2, with normal info",0,{},{}],["Derived key of type name: AES-CTR length: 256 using short derivedKey, empty salt, PBKDF2, with normal info",0,{},{}],["Derived key of type name: AES-GCM length: 128 using short derivedKey, empty salt, PBKDF2, with normal info",0,{},{}],["Derived key of type name: AES-GCM length: 192 using short derivedKey, empty salt, PBKDF2, with normal info",0,{},{}],["Derived key of type name: AES-GCM length: 256 using short derivedKey, empty salt, PBKDF2, with normal info",0,{},{}],["Derived key of type name: AES-KW length: 128 using short derivedKey, empty salt, PBKDF2, with normal info",0,{},{}],["Derived key of type name: AES-KW length: 192 using short derivedKey, empty salt, PBKDF2, with normal info",0,{},{}],["Derived key of type name: AES-KW length: 256 using short derivedKey, empty salt, PBKDF2, with normal info",0,{},{}],["Derived key of type name: HMAC hash: SHA-1 length: 256 using short derivedKey, empty salt, PBKDF2, with normal info",0,{},{}],["Derived key of type name: HMAC hash: SHA-256 length: 256 using short derivedKey, empty salt, PBKDF2, with normal info",0,{},{}],["Derived key of type name: HMAC hash: SHA-384 length: 256 using short derivedKey, empty salt, PBKDF2, with normal info",0,{},{}],["Derived key of type name: HMAC hash: SHA-512 length: 256 using short derivedKey, empty salt, PBKDF2, with normal info",0,{},{}],["short derivedKey, empty salt, PBKDF2, with empty info with non-digest algorithm PBKDF2",0,{},{}],["Derived key of type name: AES-CBC length: 128 using short derivedKey, empty salt, PBKDF2, with empty info",0,{},{}],["Derived key of type name: AES-CBC length: 192 using short derivedKey, empty salt, PBKDF2, with empty info",0,{},{}],["Derived key of type name: AES-CBC length: 256 using short derivedKey, empty salt, PBKDF2, with empty info",0,{},{}],["Derived key of type name: AES-CTR length: 128 using short derivedKey, empty salt, PBKDF2, with empty info",0,{},{}],["Derived key of type name: AES-CTR length: 192 using short derivedKey, empty salt, PBKDF2, with empty info",0,{},{}],["Derived key of type name: AES-CTR length: 256 using short derivedKey, empty salt, PBKDF2, with empty info",0,{},{}],["Derived key of type name: AES-GCM length: 128 using short derivedKey, empty salt, PBKDF2, with empty info",0,{},{}],["Derived key of type name: AES-GCM length: 192 using short derivedKey, empty salt, PBKDF2, with empty info",0,{},{}],["Derived key of type name: AES-GCM length: 256 using short derivedKey, empty salt, PBKDF2, with empty info",0,{},{}],["Derived key of type name: AES-KW length: 128 using short derivedKey, empty salt, PBKDF2, with empty info",0,{},{}],["Derived key of type name: AES-KW length: 192 using short derivedKey, empty salt, PBKDF2, with empty info",0,{},{}],["Derived key of type name: AES-KW length: 256 using short derivedKey, empty salt, PBKDF2, with empty info",0,{},{}],["Derived key of type name: HMAC hash: SHA-1 length: 256 using short derivedKey, empty salt, PBKDF2, with empty info",0,{},{}],["Derived key of type name: HMAC hash: SHA-256 length: 256 using short derivedKey, empty salt, PBKDF2, with empty info",0,{},{}],["Derived key of type name: HMAC hash: SHA-384 length: 256 using short derivedKey, empty salt, PBKDF2, with empty info",0,{},{}],["Derived key of type name: HMAC hash: SHA-512 length: 256 using short derivedKey, empty salt, PBKDF2, with empty info",0,{},{}],["long derivedKey, normal salt, SHA-384, with normal info",0,{},{}],["long derivedKey, normal salt, SHA-384, with normal info with 0 length",1,"assert_equals: deriveBits with 0 length correctly threw OperationError: Data provided to an operation does not meet requirements expected \"OperationError\" but got \"DataError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:54:33\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:50:36\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:49:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-CBC length: 128 using long derivedKey, normal salt, SHA-384, with normal info",0,{},{}],["Derived key of type name: AES-CBC length: 128 using long derivedKey, normal salt, SHA-384, with normal info with bad hash name SHA384",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-CBC length: 128 using long derivedKey, normal salt, SHA-384, with normal info with missing deriveKey usage",0,{},{}],["Derived key of type name: AES-CBC length: 128 using long derivedKey, normal salt, SHA-384, with normal info with wrong (ECDH) key",0,{},{}],["Derived key of type name: AES-CBC length: 192 using long derivedKey, normal salt, SHA-384, with normal info",0,{},{}],["Derived key of type name: AES-CBC length: 192 using long derivedKey, normal salt, SHA-384, with normal info with bad hash name SHA384",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-CBC length: 192 using long derivedKey, normal salt, SHA-384, with normal info with missing deriveKey usage",0,{},{}],["Derived key of type name: AES-CBC length: 192 using long derivedKey, normal salt, SHA-384, with normal info with wrong (ECDH) key",0,{},{}],["Derived key of type name: AES-CBC length: 256 using long derivedKey, normal salt, SHA-384, with normal info",0,{},{}],["Derived key of type name: AES-CBC length: 256 using long derivedKey, normal salt, SHA-384, with normal info with bad hash name SHA384",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-CBC length: 256 using long derivedKey, normal salt, SHA-384, with normal info with missing deriveKey usage",0,{},{}],["Derived key of type name: AES-CBC length: 256 using long derivedKey, normal salt, SHA-384, with normal info with wrong (ECDH) key",0,{},{}],["Derived key of type name: AES-CTR length: 128 using long derivedKey, normal salt, SHA-384, with normal info",0,{},{}],["Derived key of type name: AES-CTR length: 128 using long derivedKey, normal salt, SHA-384, with normal info with bad hash name SHA384",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-CTR length: 128 using long derivedKey, normal salt, SHA-384, with normal info with missing deriveKey usage",0,{},{}],["Derived key of type name: AES-CTR length: 128 using long derivedKey, normal salt, SHA-384, with normal info with wrong (ECDH) key",0,{},{}],["Derived key of type name: AES-CTR length: 192 using long derivedKey, normal salt, SHA-384, with normal info",0,{},{}],["Derived key of type name: AES-CTR length: 192 using long derivedKey, normal salt, SHA-384, with normal info with bad hash name SHA384",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-CTR length: 192 using long derivedKey, normal salt, SHA-384, with normal info with missing deriveKey usage",0,{},{}],["Derived key of type name: AES-CTR length: 192 using long derivedKey, normal salt, SHA-384, with normal info with wrong (ECDH) key",0,{},{}],["Derived key of type name: AES-CTR length: 256 using long derivedKey, normal salt, SHA-384, with normal info",0,{},{}],["Derived key of type name: AES-CTR length: 256 using long derivedKey, normal salt, SHA-384, with normal info with bad hash name SHA384",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-CTR length: 256 using long derivedKey, normal salt, SHA-384, with normal info with missing deriveKey usage",0,{},{}],["Derived key of type name: AES-CTR length: 256 using long derivedKey, normal salt, SHA-384, with normal info with wrong (ECDH) key",0,{},{}],["Derived key of type name: AES-GCM length: 128 using long derivedKey, normal salt, SHA-384, with normal info",0,{},{}],["Derived key of type name: AES-GCM length: 128 using long derivedKey, normal salt, SHA-384, with normal info with bad hash name SHA384",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-GCM length: 128 using long derivedKey, normal salt, SHA-384, with normal info with missing deriveKey usage",0,{},{}],["Derived key of type name: AES-GCM length: 128 using long derivedKey, normal salt, SHA-384, with normal info with wrong (ECDH) key",0,{},{}],["Derived key of type name: AES-GCM length: 192 using long derivedKey, normal salt, SHA-384, with normal info",0,{},{}],["Derived key of type name: AES-GCM length: 192 using long derivedKey, normal salt, SHA-384, with normal info with bad hash name SHA384",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-GCM length: 192 using long derivedKey, normal salt, SHA-384, with normal info with missing deriveKey usage",0,{},{}],["Derived key of type name: AES-GCM length: 192 using long derivedKey, normal salt, SHA-384, with normal info with wrong (ECDH) key",0,{},{}],["Derived key of type name: AES-GCM length: 256 using long derivedKey, normal salt, SHA-384, with normal info",0,{},{}],["Derived key of type name: AES-GCM length: 256 using long derivedKey, normal salt, SHA-384, with normal info with bad hash name SHA384",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-GCM length: 256 using long derivedKey, normal salt, SHA-384, with normal info with missing deriveKey usage",0,{},{}],["Derived key of type name: AES-GCM length: 256 using long derivedKey, normal salt, SHA-384, with normal info with wrong (ECDH) key",0,{},{}],["Derived key of type name: AES-KW length: 128 using long derivedKey, normal salt, SHA-384, with normal info",0,{},{}],["Derived key of type name: AES-KW length: 128 using long derivedKey, normal salt, SHA-384, with normal info with bad hash name SHA384",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-KW length: 128 using long derivedKey, normal salt, SHA-384, with normal info with missing deriveKey usage",0,{},{}],["Derived key of type name: AES-KW length: 128 using long derivedKey, normal salt, SHA-384, with normal info with wrong (ECDH) key",0,{},{}],["Derived key of type name: AES-KW length: 192 using long derivedKey, normal salt, SHA-384, with normal info",0,{},{}],["Derived key of type name: AES-KW length: 192 using long derivedKey, normal salt, SHA-384, with normal info with bad hash name SHA384",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-KW length: 192 using long derivedKey, normal salt, SHA-384, with normal info with missing deriveKey usage",0,{},{}],["Derived key of type name: AES-KW length: 192 using long derivedKey, normal salt, SHA-384, with normal info with wrong (ECDH) key",0,{},{}],["Derived key of type name: AES-KW length: 256 using long derivedKey, normal salt, SHA-384, with normal info",0,{},{}],["Derived key of type name: AES-KW length: 256 using long derivedKey, normal salt, SHA-384, with normal info with bad hash name SHA384",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-KW length: 256 using long derivedKey, normal salt, SHA-384, with normal info with missing deriveKey usage",0,{},{}],["Derived key of type name: AES-KW length: 256 using long derivedKey, normal salt, SHA-384, with normal info with wrong (ECDH) key",0,{},{}],["Derived key of type name: HMAC hash: SHA-1 length: 256 using long derivedKey, normal salt, SHA-384, with normal info",0,{},{}],["Derived key of type name: HMAC hash: SHA-1 length: 256 using long derivedKey, normal salt, SHA-384, with normal info with bad hash name SHA384",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: HMAC hash: SHA-1 length: 256 using long derivedKey, normal salt, SHA-384, with normal info with missing deriveKey usage",0,{},{}],["Derived key of type name: HMAC hash: SHA-1 length: 256 using long derivedKey, normal salt, SHA-384, with normal info with wrong (ECDH) key",0,{},{}],["Derived key of type name: HMAC hash: SHA-256 length: 256 using long derivedKey, normal salt, SHA-384, with normal info",0,{},{}],["Derived key of type name: HMAC hash: SHA-256 length: 256 using long derivedKey, normal salt, SHA-384, with normal info with bad hash name SHA384",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: HMAC hash: SHA-256 length: 256 using long derivedKey, normal salt, SHA-384, with normal info with missing deriveKey usage",0,{},{}],["Derived key of type name: HMAC hash: SHA-256 length: 256 using long derivedKey, normal salt, SHA-384, with normal info with wrong (ECDH) key",0,{},{}],["Derived key of type name: HMAC hash: SHA-384 length: 256 using long derivedKey, normal salt, SHA-384, with normal info",0,{},{}],["Derived key of type name: HMAC hash: SHA-384 length: 256 using long derivedKey, normal salt, SHA-384, with normal info with bad hash name SHA384",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: HMAC hash: SHA-384 length: 256 using long derivedKey, normal salt, SHA-384, with normal info with missing deriveKey usage",0,{},{}],["Derived key of type name: HMAC hash: SHA-384 length: 256 using long derivedKey, normal salt, SHA-384, with normal info with wrong (ECDH) key",0,{},{}],["Derived key of type name: HMAC hash: SHA-512 length: 256 using long derivedKey, normal salt, SHA-384, with normal info",0,{},{}],["Derived key of type name: HMAC hash: SHA-512 length: 256 using long derivedKey, normal salt, SHA-384, with normal info with bad hash name SHA384",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: HMAC hash: SHA-512 length: 256 using long derivedKey, normal salt, SHA-384, with normal info with missing deriveKey usage",0,{},{}],["Derived key of type name: HMAC hash: SHA-512 length: 256 using long derivedKey, normal salt, SHA-384, with normal info with wrong (ECDH) key",0,{},{}],["long derivedKey, normal salt, SHA-384, with normal info with missing salt",1,"assert_equals: deriveBits missing salt correctly threw OperationError: An invalid or illegal string was specified expected \"TypeError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:128:33\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:124:36\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:123:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["long derivedKey, normal salt, SHA-384, with normal info with missing info",1,"assert_equals: deriveBits missing info correctly threw OperationError: An invalid or illegal string was specified expected \"TypeError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:138:33\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:134:36\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:133:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["long derivedKey, normal salt, SHA-384, with normal info with null length",1,"assert_equals: deriveBits with null length correctly threw OperationError: Data provided to an operation does not meet requirements expected \"TypeError\" but got \"DataError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:148:33\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:144:36\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:143:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["long derivedKey, normal salt, SHA-384, with normal info with non-multiple of 8 length",1,"assert_unreached: non-multiple of 8 length should have thrown an OperationError Reached unreachable code","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:156:33\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:154:36\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:153:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["long derivedKey, normal salt, SHA-384, with normal info with bad hash name SHA384",1,"assert_equals: deriveBits with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:170:33\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:166:36\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:164:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["long derivedKey, normal salt, SHA-384, with normal info with missing deriveBits usage",0,{},{}],["long derivedKey, normal salt, SHA-384, with normal info with wrong (ECDH) key",0,{},{}],["long derivedKey, normal salt, SHA-384, with empty info",0,{},{}],["long derivedKey, normal salt, SHA-384, with empty info with 0 length",1,"assert_equals: deriveBits with 0 length correctly threw OperationError: Data provided to an operation does not meet requirements expected \"OperationError\" but got \"DataError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:54:33\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:50:36\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:49:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-CBC length: 128 using long derivedKey, normal salt, SHA-384, with empty info",0,{},{}],["Derived key of type name: AES-CBC length: 128 using long derivedKey, normal salt, SHA-384, with empty info with bad hash name SHA384",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-CBC length: 128 using long derivedKey, normal salt, SHA-384, with empty info with missing deriveKey usage",0,{},{}],["Derived key of type name: AES-CBC length: 128 using long derivedKey, normal salt, SHA-384, with empty info with wrong (ECDH) key",0,{},{}],["Derived key of type name: AES-CBC length: 192 using long derivedKey, normal salt, SHA-384, with empty info",0,{},{}],["Derived key of type name: AES-CBC length: 192 using long derivedKey, normal salt, SHA-384, with empty info with bad hash name SHA384",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-CBC length: 192 using long derivedKey, normal salt, SHA-384, with empty info with missing deriveKey usage",0,{},{}],["Derived key of type name: AES-CBC length: 192 using long derivedKey, normal salt, SHA-384, with empty info with wrong (ECDH) key",0,{},{}],["Derived key of type name: AES-CBC length: 256 using long derivedKey, normal salt, SHA-384, with empty info",0,{},{}],["Derived key of type name: AES-CBC length: 256 using long derivedKey, normal salt, SHA-384, with empty info with bad hash name SHA384",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-CBC length: 256 using long derivedKey, normal salt, SHA-384, with empty info with missing deriveKey usage",0,{},{}],["Derived key of type name: AES-CBC length: 256 using long derivedKey, normal salt, SHA-384, with empty info with wrong (ECDH) key",0,{},{}],["Derived key of type name: AES-CTR length: 128 using long derivedKey, normal salt, SHA-384, with empty info",0,{},{}],["Derived key of type name: AES-CTR length: 128 using long derivedKey, normal salt, SHA-384, with empty info with bad hash name SHA384",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-CTR length: 128 using long derivedKey, normal salt, SHA-384, with empty info with missing deriveKey usage",0,{},{}],["Derived key of type name: AES-CTR length: 128 using long derivedKey, normal salt, SHA-384, with empty info with wrong (ECDH) key",0,{},{}],["Derived key of type name: AES-CTR length: 192 using long derivedKey, normal salt, SHA-384, with empty info",0,{},{}],["Derived key of type name: AES-CTR length: 192 using long derivedKey, normal salt, SHA-384, with empty info with bad hash name SHA384",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-CTR length: 192 using long derivedKey, normal salt, SHA-384, with empty info with missing deriveKey usage",0,{},{}],["Derived key of type name: AES-CTR length: 192 using long derivedKey, normal salt, SHA-384, with empty info with wrong (ECDH) key",0,{},{}],["Derived key of type name: AES-CTR length: 256 using long derivedKey, normal salt, SHA-384, with empty info",0,{},{}],["Derived key of type name: AES-CTR length: 256 using long derivedKey, normal salt, SHA-384, with empty info with bad hash name SHA384",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-CTR length: 256 using long derivedKey, normal salt, SHA-384, with empty info with missing deriveKey usage",0,{},{}],["Derived key of type name: AES-CTR length: 256 using long derivedKey, normal salt, SHA-384, with empty info with wrong (ECDH) key",0,{},{}],["Derived key of type name: AES-GCM length: 128 using long derivedKey, normal salt, SHA-384, with empty info",0,{},{}],["Derived key of type name: AES-GCM length: 128 using long derivedKey, normal salt, SHA-384, with empty info with bad hash name SHA384",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-GCM length: 128 using long derivedKey, normal salt, SHA-384, with empty info with missing deriveKey usage",0,{},{}],["Derived key of type name: AES-GCM length: 128 using long derivedKey, normal salt, SHA-384, with empty info with wrong (ECDH) key",0,{},{}],["Derived key of type name: AES-GCM length: 192 using long derivedKey, normal salt, SHA-384, with empty info",0,{},{}],["Derived key of type name: AES-GCM length: 192 using long derivedKey, normal salt, SHA-384, with empty info with bad hash name SHA384",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-GCM length: 192 using long derivedKey, normal salt, SHA-384, with empty info with missing deriveKey usage",0,{},{}],["Derived key of type name: AES-GCM length: 192 using long derivedKey, normal salt, SHA-384, with empty info with wrong (ECDH) key",0,{},{}],["Derived key of type name: AES-GCM length: 256 using long derivedKey, normal salt, SHA-384, with empty info",0,{},{}],["Derived key of type name: AES-GCM length: 256 using long derivedKey, normal salt, SHA-384, with empty info with bad hash name SHA384",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-GCM length: 256 using long derivedKey, normal salt, SHA-384, with empty info with missing deriveKey usage",0,{},{}],["Derived key of type name: AES-GCM length: 256 using long derivedKey, normal salt, SHA-384, with empty info with wrong (ECDH) key",0,{},{}],["Derived key of type name: AES-KW length: 128 using long derivedKey, normal salt, SHA-384, with empty info",0,{},{}],["Derived key of type name: AES-KW length: 128 using long derivedKey, normal salt, SHA-384, with empty info with bad hash name SHA384",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-KW length: 128 using long derivedKey, normal salt, SHA-384, with empty info with missing deriveKey usage",0,{},{}],["Derived key of type name: AES-KW length: 128 using long derivedKey, normal salt, SHA-384, with empty info with wrong (ECDH) key",0,{},{}],["Derived key of type name: AES-KW length: 192 using long derivedKey, normal salt, SHA-384, with empty info",0,{},{}],["Derived key of type name: AES-KW length: 192 using long derivedKey, normal salt, SHA-384, with empty info with bad hash name SHA384",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-KW length: 192 using long derivedKey, normal salt, SHA-384, with empty info with missing deriveKey usage",0,{},{}],["Derived key of type name: AES-KW length: 192 using long derivedKey, normal salt, SHA-384, with empty info with wrong (ECDH) key",0,{},{}],["Derived key of type name: AES-KW length: 256 using long derivedKey, normal salt, SHA-384, with empty info",0,{},{}],["Derived key of type name: AES-KW length: 256 using long derivedKey, normal salt, SHA-384, with empty info with bad hash name SHA384",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-KW length: 256 using long derivedKey, normal salt, SHA-384, with empty info with missing deriveKey usage",0,{},{}],["Derived key of type name: AES-KW length: 256 using long derivedKey, normal salt, SHA-384, with empty info with wrong (ECDH) key",0,{},{}],["Derived key of type name: HMAC hash: SHA-1 length: 256 using long derivedKey, normal salt, SHA-384, with empty info",0,{},{}],["Derived key of type name: HMAC hash: SHA-1 length: 256 using long derivedKey, normal salt, SHA-384, with empty info with bad hash name SHA384",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: HMAC hash: SHA-1 length: 256 using long derivedKey, normal salt, SHA-384, with empty info with missing deriveKey usage",0,{},{}],["Derived key of type name: HMAC hash: SHA-1 length: 256 using long derivedKey, normal salt, SHA-384, with empty info with wrong (ECDH) key",0,{},{}],["Derived key of type name: HMAC hash: SHA-256 length: 256 using long derivedKey, normal salt, SHA-384, with empty info",0,{},{}],["Derived key of type name: HMAC hash: SHA-256 length: 256 using long derivedKey, normal salt, SHA-384, with empty info with bad hash name SHA384",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: HMAC hash: SHA-256 length: 256 using long derivedKey, normal salt, SHA-384, with empty info with missing deriveKey usage",0,{},{}],["Derived key of type name: HMAC hash: SHA-256 length: 256 using long derivedKey, normal salt, SHA-384, with empty info with wrong (ECDH) key",0,{},{}],["Derived key of type name: HMAC hash: SHA-384 length: 256 using long derivedKey, normal salt, SHA-384, with empty info",0,{},{}],["Derived key of type name: HMAC hash: SHA-384 length: 256 using long derivedKey, normal salt, SHA-384, with empty info with bad hash name SHA384",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: HMAC hash: SHA-384 length: 256 using long derivedKey, normal salt, SHA-384, with empty info with missing deriveKey usage",0,{},{}],["Derived key of type name: HMAC hash: SHA-384 length: 256 using long derivedKey, normal salt, SHA-384, with empty info with wrong (ECDH) key",0,{},{}],["Derived key of type name: HMAC hash: SHA-512 length: 256 using long derivedKey, normal salt, SHA-384, with empty info",0,{},{}],["Derived key of type name: HMAC hash: SHA-512 length: 256 using long derivedKey, normal salt, SHA-384, with empty info with bad hash name SHA384",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: HMAC hash: SHA-512 length: 256 using long derivedKey, normal salt, SHA-384, with empty info with missing deriveKey usage",0,{},{}],["Derived key of type name: HMAC hash: SHA-512 length: 256 using long derivedKey, normal salt, SHA-384, with empty info with wrong (ECDH) key",0,{},{}],["long derivedKey, normal salt, SHA-384, with empty info with missing salt",1,"assert_equals: deriveBits missing salt correctly threw OperationError: An invalid or illegal string was specified expected \"TypeError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:128:33\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:124:36\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:123:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["long derivedKey, normal salt, SHA-384, with empty info with missing info",1,"assert_equals: deriveBits missing info correctly threw OperationError: An invalid or illegal string was specified expected \"TypeError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:138:33\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:134:36\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:133:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["long derivedKey, normal salt, SHA-384, with empty info with null length",1,"assert_equals: deriveBits with null length correctly threw OperationError: Data provided to an operation does not meet requirements expected \"TypeError\" but got \"DataError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:148:33\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:144:36\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:143:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["long derivedKey, normal salt, SHA-384, with empty info with non-multiple of 8 length",1,"assert_unreached: non-multiple of 8 length should have thrown an OperationError Reached unreachable code","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:156:33\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:154:36\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:153:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["long derivedKey, normal salt, SHA-384, with empty info with bad hash name SHA384",1,"assert_equals: deriveBits with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:170:33\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:166:36\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:164:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["long derivedKey, normal salt, SHA-384, with empty info with missing deriveBits usage",0,{},{}],["long derivedKey, normal salt, SHA-384, with empty info with wrong (ECDH) key",0,{},{}],["long derivedKey, normal salt, SHA-512, with normal info",0,{},{}],["long derivedKey, normal salt, SHA-512, with normal info with 0 length",1,"assert_equals: deriveBits with 0 length correctly threw OperationError: Data provided to an operation does not meet requirements expected \"OperationError\" but got \"DataError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:54:33\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:50:36\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:49:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-CBC length: 128 using long derivedKey, normal salt, SHA-512, with normal info",0,{},{}],["Derived key of type name: AES-CBC length: 128 using long derivedKey, normal salt, SHA-512, with normal info with bad hash name SHA512",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-CBC length: 128 using long derivedKey, normal salt, SHA-512, with normal info with missing deriveKey usage",0,{},{}],["Derived key of type name: AES-CBC length: 128 using long derivedKey, normal salt, SHA-512, with normal info with wrong (ECDH) key",0,{},{}],["Derived key of type name: AES-CBC length: 192 using long derivedKey, normal salt, SHA-512, with normal info",0,{},{}],["Derived key of type name: AES-CBC length: 192 using long derivedKey, normal salt, SHA-512, with normal info with bad hash name SHA512",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-CBC length: 192 using long derivedKey, normal salt, SHA-512, with normal info with missing deriveKey usage",0,{},{}],["Derived key of type name: AES-CBC length: 192 using long derivedKey, normal salt, SHA-512, with normal info with wrong (ECDH) key",0,{},{}],["Derived key of type name: AES-CBC length: 256 using long derivedKey, normal salt, SHA-512, with normal info",0,{},{}],["Derived key of type name: AES-CBC length: 256 using long derivedKey, normal salt, SHA-512, with normal info with bad hash name SHA512",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-CBC length: 256 using long derivedKey, normal salt, SHA-512, with normal info with missing deriveKey usage",0,{},{}],["Derived key of type name: AES-CBC length: 256 using long derivedKey, normal salt, SHA-512, with normal info with wrong (ECDH) key",0,{},{}],["Derived key of type name: AES-CTR length: 128 using long derivedKey, normal salt, SHA-512, with normal info",0,{},{}],["Derived key of type name: AES-CTR length: 128 using long derivedKey, normal salt, SHA-512, with normal info with bad hash name SHA512",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-CTR length: 128 using long derivedKey, normal salt, SHA-512, with normal info with missing deriveKey usage",0,{},{}],["Derived key of type name: AES-CTR length: 128 using long derivedKey, normal salt, SHA-512, with normal info with wrong (ECDH) key",0,{},{}],["Derived key of type name: AES-CTR length: 192 using long derivedKey, normal salt, SHA-512, with normal info",0,{},{}],["Derived key of type name: AES-CTR length: 192 using long derivedKey, normal salt, SHA-512, with normal info with bad hash name SHA512",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-CTR length: 192 using long derivedKey, normal salt, SHA-512, with normal info with missing deriveKey usage",0,{},{}],["Derived key of type name: AES-CTR length: 192 using long derivedKey, normal salt, SHA-512, with normal info with wrong (ECDH) key",0,{},{}],["Derived key of type name: AES-CTR length: 256 using long derivedKey, normal salt, SHA-512, with normal info",0,{},{}],["Derived key of type name: AES-CTR length: 256 using long derivedKey, normal salt, SHA-512, with normal info with bad hash name SHA512",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-CTR length: 256 using long derivedKey, normal salt, SHA-512, with normal info with missing deriveKey usage",0,{},{}],["Derived key of type name: AES-CTR length: 256 using long derivedKey, normal salt, SHA-512, with normal info with wrong (ECDH) key",0,{},{}],["Derived key of type name: AES-GCM length: 128 using long derivedKey, normal salt, SHA-512, with normal info",0,{},{}],["Derived key of type name: AES-GCM length: 128 using long derivedKey, normal salt, SHA-512, with normal info with bad hash name SHA512",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-GCM length: 128 using long derivedKey, normal salt, SHA-512, with normal info with missing deriveKey usage",0,{},{}],["Derived key of type name: AES-GCM length: 128 using long derivedKey, normal salt, SHA-512, with normal info with wrong (ECDH) key",0,{},{}],["Derived key of type name: AES-GCM length: 192 using long derivedKey, normal salt, SHA-512, with normal info",0,{},{}],["Derived key of type name: AES-GCM length: 192 using long derivedKey, normal salt, SHA-512, with normal info with bad hash name SHA512",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-GCM length: 192 using long derivedKey, normal salt, SHA-512, with normal info with missing deriveKey usage",0,{},{}],["Derived key of type name: AES-GCM length: 192 using long derivedKey, normal salt, SHA-512, with normal info with wrong (ECDH) key",0,{},{}],["Derived key of type name: AES-GCM length: 256 using long derivedKey, normal salt, SHA-512, with normal info",0,{},{}],["Derived key of type name: AES-GCM length: 256 using long derivedKey, normal salt, SHA-512, with normal info with bad hash name SHA512",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-GCM length: 256 using long derivedKey, normal salt, SHA-512, with normal info with missing deriveKey usage",0,{},{}],["Derived key of type name: AES-GCM length: 256 using long derivedKey, normal salt, SHA-512, with normal info with wrong (ECDH) key",0,{},{}],["Derived key of type name: AES-KW length: 128 using long derivedKey, normal salt, SHA-512, with normal info",0,{},{}],["Derived key of type name: AES-KW length: 128 using long derivedKey, normal salt, SHA-512, with normal info with bad hash name SHA512",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-KW length: 128 using long derivedKey, normal salt, SHA-512, with normal info with missing deriveKey usage",0,{},{}],["Derived key of type name: AES-KW length: 128 using long derivedKey, normal salt, SHA-512, with normal info with wrong (ECDH) key",0,{},{}],["Derived key of type name: AES-KW length: 192 using long derivedKey, normal salt, SHA-512, with normal info",0,{},{}],["Derived key of type name: AES-KW length: 192 using long derivedKey, normal salt, SHA-512, with normal info with bad hash name SHA512",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-KW length: 192 using long derivedKey, normal salt, SHA-512, with normal info with missing deriveKey usage",0,{},{}],["Derived key of type name: AES-KW length: 192 using long derivedKey, normal salt, SHA-512, with normal info with wrong (ECDH) key",0,{},{}],["Derived key of type name: AES-KW length: 256 using long derivedKey, normal salt, SHA-512, with normal info",0,{},{}],["Derived key of type name: AES-KW length: 256 using long derivedKey, normal salt, SHA-512, with normal info with bad hash name SHA512",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-KW length: 256 using long derivedKey, normal salt, SHA-512, with normal info with missing deriveKey usage",0,{},{}],["Derived key of type name: AES-KW length: 256 using long derivedKey, normal salt, SHA-512, with normal info with wrong (ECDH) key",0,{},{}],["Derived key of type name: HMAC hash: SHA-1 length: 256 using long derivedKey, normal salt, SHA-512, with normal info",0,{},{}],["Derived key of type name: HMAC hash: SHA-1 length: 256 using long derivedKey, normal salt, SHA-512, with normal info with bad hash name SHA512",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: HMAC hash: SHA-1 length: 256 using long derivedKey, normal salt, SHA-512, with normal info with missing deriveKey usage",0,{},{}],["Derived key of type name: HMAC hash: SHA-1 length: 256 using long derivedKey, normal salt, SHA-512, with normal info with wrong (ECDH) key",0,{},{}],["Derived key of type name: HMAC hash: SHA-256 length: 256 using long derivedKey, normal salt, SHA-512, with normal info",0,{},{}],["Derived key of type name: HMAC hash: SHA-256 length: 256 using long derivedKey, normal salt, SHA-512, with normal info with bad hash name SHA512",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: HMAC hash: SHA-256 length: 256 using long derivedKey, normal salt, SHA-512, with normal info with missing deriveKey usage",0,{},{}],["Derived key of type name: HMAC hash: SHA-256 length: 256 using long derivedKey, normal salt, SHA-512, with normal info with wrong (ECDH) key",0,{},{}],["Derived key of type name: HMAC hash: SHA-384 length: 256 using long derivedKey, normal salt, SHA-512, with normal info",0,{},{}],["Derived key of type name: HMAC hash: SHA-384 length: 256 using long derivedKey, normal salt, SHA-512, with normal info with bad hash name SHA512",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: HMAC hash: SHA-384 length: 256 using long derivedKey, normal salt, SHA-512, with normal info with missing deriveKey usage",0,{},{}],["Derived key of type name: HMAC hash: SHA-384 length: 256 using long derivedKey, normal salt, SHA-512, with normal info with wrong (ECDH) key",0,{},{}],["Derived key of type name: HMAC hash: SHA-512 length: 256 using long derivedKey, normal salt, SHA-512, with normal info",0,{},{}],["Derived key of type name: HMAC hash: SHA-512 length: 256 using long derivedKey, normal salt, SHA-512, with normal info with bad hash name SHA512",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: HMAC hash: SHA-512 length: 256 using long derivedKey, normal salt, SHA-512, with normal info with missing deriveKey usage",0,{},{}],["Derived key of type name: HMAC hash: SHA-512 length: 256 using long derivedKey, normal salt, SHA-512, with normal info with wrong (ECDH) key",0,{},{}],["long derivedKey, normal salt, SHA-512, with normal info with missing salt",1,"assert_equals: deriveBits missing salt correctly threw OperationError: An invalid or illegal string was specified expected \"TypeError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:128:33\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:124:36\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:123:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["long derivedKey, normal salt, SHA-512, with normal info with missing info",1,"assert_equals: deriveBits missing info correctly threw OperationError: An invalid or illegal string was specified expected \"TypeError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:138:33\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:134:36\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:133:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["long derivedKey, normal salt, SHA-512, with normal info with null length",1,"assert_equals: deriveBits with null length correctly threw OperationError: Data provided to an operation does not meet requirements expected \"TypeError\" but got \"DataError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:148:33\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:144:36\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:143:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["long derivedKey, normal salt, SHA-512, with normal info with non-multiple of 8 length",1,"assert_unreached: non-multiple of 8 length should have thrown an OperationError Reached unreachable code","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:156:33\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:154:36\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:153:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["long derivedKey, normal salt, SHA-512, with normal info with bad hash name SHA512",1,"assert_equals: deriveBits with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:170:33\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:166:36\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:164:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["long derivedKey, normal salt, SHA-512, with normal info with missing deriveBits usage",0,{},{}],["long derivedKey, normal salt, SHA-512, with normal info with wrong (ECDH) key",0,{},{}],["long derivedKey, normal salt, SHA-512, with empty info",0,{},{}],["long derivedKey, normal salt, SHA-512, with empty info with 0 length",1,"assert_equals: deriveBits with 0 length correctly threw OperationError: Data provided to an operation does not meet requirements expected \"OperationError\" but got \"DataError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:54:33\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:50:36\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:49:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-CBC length: 128 using long derivedKey, normal salt, SHA-512, with empty info",0,{},{}],["Derived key of type name: AES-CBC length: 128 using long derivedKey, normal salt, SHA-512, with empty info with bad hash name SHA512",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-CBC length: 128 using long derivedKey, normal salt, SHA-512, with empty info with missing deriveKey usage",0,{},{}],["Derived key of type name: AES-CBC length: 128 using long derivedKey, normal salt, SHA-512, with empty info with wrong (ECDH) key",0,{},{}],["Derived key of type name: AES-CBC length: 192 using long derivedKey, normal salt, SHA-512, with empty info",0,{},{}],["Derived key of type name: AES-CBC length: 192 using long derivedKey, normal salt, SHA-512, with empty info with bad hash name SHA512",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-CBC length: 192 using long derivedKey, normal salt, SHA-512, with empty info with missing deriveKey usage",0,{},{}],["Derived key of type name: AES-CBC length: 192 using long derivedKey, normal salt, SHA-512, with empty info with wrong (ECDH) key",0,{},{}],["Derived key of type name: AES-CBC length: 256 using long derivedKey, normal salt, SHA-512, with empty info",0,{},{}],["Derived key of type name: AES-CBC length: 256 using long derivedKey, normal salt, SHA-512, with empty info with bad hash name SHA512",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-CBC length: 256 using long derivedKey, normal salt, SHA-512, with empty info with missing deriveKey usage",0,{},{}],["Derived key of type name: AES-CBC length: 256 using long derivedKey, normal salt, SHA-512, with empty info with wrong (ECDH) key",0,{},{}],["Derived key of type name: AES-CTR length: 128 using long derivedKey, normal salt, SHA-512, with empty info",0,{},{}],["Derived key of type name: AES-CTR length: 128 using long derivedKey, normal salt, SHA-512, with empty info with bad hash name SHA512",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-CTR length: 128 using long derivedKey, normal salt, SHA-512, with empty info with missing deriveKey usage",0,{},{}],["Derived key of type name: AES-CTR length: 128 using long derivedKey, normal salt, SHA-512, with empty info with wrong (ECDH) key",0,{},{}],["Derived key of type name: AES-CTR length: 192 using long derivedKey, normal salt, SHA-512, with empty info",0,{},{}],["Derived key of type name: AES-CTR length: 192 using long derivedKey, normal salt, SHA-512, with empty info with bad hash name SHA512",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-CTR length: 192 using long derivedKey, normal salt, SHA-512, with empty info with missing deriveKey usage",0,{},{}],["Derived key of type name: AES-CTR length: 192 using long derivedKey, normal salt, SHA-512, with empty info with wrong (ECDH) key",0,{},{}],["Derived key of type name: AES-CTR length: 256 using long derivedKey, normal salt, SHA-512, with empty info",0,{},{}],["Derived key of type name: AES-CTR length: 256 using long derivedKey, normal salt, SHA-512, with empty info with bad hash name SHA512",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-CTR length: 256 using long derivedKey, normal salt, SHA-512, with empty info with missing deriveKey usage",0,{},{}],["Derived key of type name: AES-CTR length: 256 using long derivedKey, normal salt, SHA-512, with empty info with wrong (ECDH) key",0,{},{}],["Derived key of type name: AES-GCM length: 128 using long derivedKey, normal salt, SHA-512, with empty info",0,{},{}],["Derived key of type name: AES-GCM length: 128 using long derivedKey, normal salt, SHA-512, with empty info with bad hash name SHA512",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-GCM length: 128 using long derivedKey, normal salt, SHA-512, with empty info with missing deriveKey usage",0,{},{}],["Derived key of type name: AES-GCM length: 128 using long derivedKey, normal salt, SHA-512, with empty info with wrong (ECDH) key",0,{},{}],["Derived key of type name: AES-GCM length: 192 using long derivedKey, normal salt, SHA-512, with empty info",0,{},{}],["Derived key of type name: AES-GCM length: 192 using long derivedKey, normal salt, SHA-512, with empty info with bad hash name SHA512",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-GCM length: 192 using long derivedKey, normal salt, SHA-512, with empty info with missing deriveKey usage",0,{},{}],["Derived key of type name: AES-GCM length: 192 using long derivedKey, normal salt, SHA-512, with empty info with wrong (ECDH) key",0,{},{}],["Derived key of type name: AES-GCM length: 256 using long derivedKey, normal salt, SHA-512, with empty info",0,{},{}],["Derived key of type name: AES-GCM length: 256 using long derivedKey, normal salt, SHA-512, with empty info with bad hash name SHA512",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-GCM length: 256 using long derivedKey, normal salt, SHA-512, with empty info with missing deriveKey usage",0,{},{}],["Derived key of type name: AES-GCM length: 256 using long derivedKey, normal salt, SHA-512, with empty info with wrong (ECDH) key",0,{},{}],["Derived key of type name: AES-KW length: 128 using long derivedKey, normal salt, SHA-512, with empty info",0,{},{}],["Derived key of type name: AES-KW length: 128 using long derivedKey, normal salt, SHA-512, with empty info with bad hash name SHA512",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-KW length: 128 using long derivedKey, normal salt, SHA-512, with empty info with missing deriveKey usage",0,{},{}],["Derived key of type name: AES-KW length: 128 using long derivedKey, normal salt, SHA-512, with empty info with wrong (ECDH) key",0,{},{}],["Derived key of type name: AES-KW length: 192 using long derivedKey, normal salt, SHA-512, with empty info",0,{},{}],["Derived key of type name: AES-KW length: 192 using long derivedKey, normal salt, SHA-512, with empty info with bad hash name SHA512",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-KW length: 192 using long derivedKey, normal salt, SHA-512, with empty info with missing deriveKey usage",0,{},{}],["Derived key of type name: AES-KW length: 192 using long derivedKey, normal salt, SHA-512, with empty info with wrong (ECDH) key",0,{},{}],["Derived key of type name: AES-KW length: 256 using long derivedKey, normal salt, SHA-512, with empty info",0,{},{}],["Derived key of type name: AES-KW length: 256 using long derivedKey, normal salt, SHA-512, with empty info with bad hash name SHA512",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-KW length: 256 using long derivedKey, normal salt, SHA-512, with empty info with missing deriveKey usage",0,{},{}],["Derived key of type name: AES-KW length: 256 using long derivedKey, normal salt, SHA-512, with empty info with wrong (ECDH) key",0,{},{}],["Derived key of type name: HMAC hash: SHA-1 length: 256 using long derivedKey, normal salt, SHA-512, with empty info",0,{},{}],["Derived key of type name: HMAC hash: SHA-1 length: 256 using long derivedKey, normal salt, SHA-512, with empty info with bad hash name SHA512",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: HMAC hash: SHA-1 length: 256 using long derivedKey, normal salt, SHA-512, with empty info with missing deriveKey usage",0,{},{}],["Derived key of type name: HMAC hash: SHA-1 length: 256 using long derivedKey, normal salt, SHA-512, with empty info with wrong (ECDH) key",0,{},{}],["Derived key of type name: HMAC hash: SHA-256 length: 256 using long derivedKey, normal salt, SHA-512, with empty info",0,{},{}],["Derived key of type name: HMAC hash: SHA-256 length: 256 using long derivedKey, normal salt, SHA-512, with empty info with bad hash name SHA512",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: HMAC hash: SHA-256 length: 256 using long derivedKey, normal salt, SHA-512, with empty info with missing deriveKey usage",0,{},{}],["Derived key of type name: HMAC hash: SHA-256 length: 256 using long derivedKey, normal salt, SHA-512, with empty info with wrong (ECDH) key",0,{},{}],["Derived key of type name: HMAC hash: SHA-384 length: 256 using long derivedKey, normal salt, SHA-512, with empty info",0,{},{}],["Derived key of type name: HMAC hash: SHA-384 length: 256 using long derivedKey, normal salt, SHA-512, with empty info with bad hash name SHA512",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: HMAC hash: SHA-384 length: 256 using long derivedKey, normal salt, SHA-512, with empty info with missing deriveKey usage",0,{},{}],["Derived key of type name: HMAC hash: SHA-384 length: 256 using long derivedKey, normal salt, SHA-512, with empty info with wrong (ECDH) key",0,{},{}],["Derived key of type name: HMAC hash: SHA-512 length: 256 using long derivedKey, normal salt, SHA-512, with empty info",0,{},{}],["Derived key of type name: HMAC hash: SHA-512 length: 256 using long derivedKey, normal salt, SHA-512, with empty info with bad hash name SHA512",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: HMAC hash: SHA-512 length: 256 using long derivedKey, normal salt, SHA-512, with empty info with missing deriveKey usage",0,{},{}],["Derived key of type name: HMAC hash: SHA-512 length: 256 using long derivedKey, normal salt, SHA-512, with empty info with wrong (ECDH) key",0,{},{}],["long derivedKey, normal salt, SHA-512, with empty info with missing salt",1,"assert_equals: deriveBits missing salt correctly threw OperationError: An invalid or illegal string was specified expected \"TypeError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:128:33\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:124:36\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:123:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["long derivedKey, normal salt, SHA-512, with empty info with missing info",1,"assert_equals: deriveBits missing info correctly threw OperationError: An invalid or illegal string was specified expected \"TypeError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:138:33\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:134:36\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:133:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["long derivedKey, normal salt, SHA-512, with empty info with null length",1,"assert_equals: deriveBits with null length correctly threw OperationError: Data provided to an operation does not meet requirements expected \"TypeError\" but got \"DataError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:148:33\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:144:36\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:143:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["long derivedKey, normal salt, SHA-512, with empty info with non-multiple of 8 length",1,"assert_unreached: non-multiple of 8 length should have thrown an OperationError Reached unreachable code","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:156:33\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:154:36\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:153:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["long derivedKey, normal salt, SHA-512, with empty info with bad hash name SHA512",1,"assert_equals: deriveBits with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:170:33\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:166:36\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:164:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["long derivedKey, normal salt, SHA-512, with empty info with missing deriveBits usage",0,{},{}],["long derivedKey, normal salt, SHA-512, with empty info with wrong (ECDH) key",0,{},{}],["long derivedKey, normal salt, SHA-1, with normal info",0,{},{}],["long derivedKey, normal salt, SHA-1, with normal info with 0 length",1,"assert_equals: deriveBits with 0 length correctly threw OperationError: Data provided to an operation does not meet requirements expected \"OperationError\" but got \"DataError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:54:33\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:50:36\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:49:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-CBC length: 128 using long derivedKey, normal salt, SHA-1, with normal info",0,{},{}],["Derived key of type name: AES-CBC length: 128 using long derivedKey, normal salt, SHA-1, with normal info with bad hash name SHA1",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-CBC length: 128 using long derivedKey, normal salt, SHA-1, with normal info with missing deriveKey usage",0,{},{}],["Derived key of type name: AES-CBC length: 128 using long derivedKey, normal salt, SHA-1, with normal info with wrong (ECDH) key",0,{},{}],["Derived key of type name: AES-CBC length: 192 using long derivedKey, normal salt, SHA-1, with normal info",0,{},{}],["Derived key of type name: AES-CBC length: 192 using long derivedKey, normal salt, SHA-1, with normal info with bad hash name SHA1",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-CBC length: 192 using long derivedKey, normal salt, SHA-1, with normal info with missing deriveKey usage",0,{},{}],["Derived key of type name: AES-CBC length: 192 using long derivedKey, normal salt, SHA-1, with normal info with wrong (ECDH) key",0,{},{}],["Derived key of type name: AES-CBC length: 256 using long derivedKey, normal salt, SHA-1, with normal info",0,{},{}],["Derived key of type name: AES-CBC length: 256 using long derivedKey, normal salt, SHA-1, with normal info with bad hash name SHA1",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-CBC length: 256 using long derivedKey, normal salt, SHA-1, with normal info with missing deriveKey usage",0,{},{}],["Derived key of type name: AES-CBC length: 256 using long derivedKey, normal salt, SHA-1, with normal info with wrong (ECDH) key",0,{},{}],["Derived key of type name: AES-CTR length: 128 using long derivedKey, normal salt, SHA-1, with normal info",0,{},{}],["Derived key of type name: AES-CTR length: 128 using long derivedKey, normal salt, SHA-1, with normal info with bad hash name SHA1",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-CTR length: 128 using long derivedKey, normal salt, SHA-1, with normal info with missing deriveKey usage",0,{},{}],["Derived key of type name: AES-CTR length: 128 using long derivedKey, normal salt, SHA-1, with normal info with wrong (ECDH) key",0,{},{}],["Derived key of type name: AES-CTR length: 192 using long derivedKey, normal salt, SHA-1, with normal info",0,{},{}],["Derived key of type name: AES-CTR length: 192 using long derivedKey, normal salt, SHA-1, with normal info with bad hash name SHA1",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-CTR length: 192 using long derivedKey, normal salt, SHA-1, with normal info with missing deriveKey usage",0,{},{}],["Derived key of type name: AES-CTR length: 192 using long derivedKey, normal salt, SHA-1, with normal info with wrong (ECDH) key",0,{},{}],["Derived key of type name: AES-CTR length: 256 using long derivedKey, normal salt, SHA-1, with normal info",0,{},{}],["Derived key of type name: AES-CTR length: 256 using long derivedKey, normal salt, SHA-1, with normal info with bad hash name SHA1",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-CTR length: 256 using long derivedKey, normal salt, SHA-1, with normal info with missing deriveKey usage",0,{},{}],["Derived key of type name: AES-CTR length: 256 using long derivedKey, normal salt, SHA-1, with normal info with wrong (ECDH) key",0,{},{}],["Derived key of type name: AES-GCM length: 128 using long derivedKey, normal salt, SHA-1, with normal info",0,{},{}],["Derived key of type name: AES-GCM length: 128 using long derivedKey, normal salt, SHA-1, with normal info with bad hash name SHA1",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-GCM length: 128 using long derivedKey, normal salt, SHA-1, with normal info with missing deriveKey usage",0,{},{}],["Derived key of type name: AES-GCM length: 128 using long derivedKey, normal salt, SHA-1, with normal info with wrong (ECDH) key",0,{},{}],["Derived key of type name: AES-GCM length: 192 using long derivedKey, normal salt, SHA-1, with normal info",0,{},{}],["Derived key of type name: AES-GCM length: 192 using long derivedKey, normal salt, SHA-1, with normal info with bad hash name SHA1",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-GCM length: 192 using long derivedKey, normal salt, SHA-1, with normal info with missing deriveKey usage",0,{},{}],["Derived key of type name: AES-GCM length: 192 using long derivedKey, normal salt, SHA-1, with normal info with wrong (ECDH) key",0,{},{}],["Derived key of type name: AES-GCM length: 256 using long derivedKey, normal salt, SHA-1, with normal info",0,{},{}],["Derived key of type name: AES-GCM length: 256 using long derivedKey, normal salt, SHA-1, with normal info with bad hash name SHA1",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-GCM length: 256 using long derivedKey, normal salt, SHA-1, with normal info with missing deriveKey usage",0,{},{}],["Derived key of type name: AES-GCM length: 256 using long derivedKey, normal salt, SHA-1, with normal info with wrong (ECDH) key",0,{},{}],["Derived key of type name: AES-KW length: 128 using long derivedKey, normal salt, SHA-1, with normal info",0,{},{}],["Derived key of type name: AES-KW length: 128 using long derivedKey, normal salt, SHA-1, with normal info with bad hash name SHA1",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-KW length: 128 using long derivedKey, normal salt, SHA-1, with normal info with missing deriveKey usage",0,{},{}],["Derived key of type name: AES-KW length: 128 using long derivedKey, normal salt, SHA-1, with normal info with wrong (ECDH) key",0,{},{}],["Derived key of type name: AES-KW length: 192 using long derivedKey, normal salt, SHA-1, with normal info",0,{},{}],["Derived key of type name: AES-KW length: 192 using long derivedKey, normal salt, SHA-1, with normal info with bad hash name SHA1",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-KW length: 192 using long derivedKey, normal salt, SHA-1, with normal info with missing deriveKey usage",0,{},{}],["Derived key of type name: AES-KW length: 192 using long derivedKey, normal salt, SHA-1, with normal info with wrong (ECDH) key",0,{},{}],["Derived key of type name: AES-KW length: 256 using long derivedKey, normal salt, SHA-1, with normal info",0,{},{}],["Derived key of type name: AES-KW length: 256 using long derivedKey, normal salt, SHA-1, with normal info with bad hash name SHA1",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-KW length: 256 using long derivedKey, normal salt, SHA-1, with normal info with missing deriveKey usage",0,{},{}],["Derived key of type name: AES-KW length: 256 using long derivedKey, normal salt, SHA-1, with normal info with wrong (ECDH) key",0,{},{}],["Derived key of type name: HMAC hash: SHA-1 length: 256 using long derivedKey, normal salt, SHA-1, with normal info",0,{},{}],["Derived key of type name: HMAC hash: SHA-1 length: 256 using long derivedKey, normal salt, SHA-1, with normal info with bad hash name SHA1",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: HMAC hash: SHA-1 length: 256 using long derivedKey, normal salt, SHA-1, with normal info with missing deriveKey usage",0,{},{}],["Derived key of type name: HMAC hash: SHA-1 length: 256 using long derivedKey, normal salt, SHA-1, with normal info with wrong (ECDH) key",0,{},{}],["Derived key of type name: HMAC hash: SHA-256 length: 256 using long derivedKey, normal salt, SHA-1, with normal info",0,{},{}],["Derived key of type name: HMAC hash: SHA-256 length: 256 using long derivedKey, normal salt, SHA-1, with normal info with bad hash name SHA1",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: HMAC hash: SHA-256 length: 256 using long derivedKey, normal salt, SHA-1, with normal info with missing deriveKey usage",0,{},{}],["Derived key of type name: HMAC hash: SHA-256 length: 256 using long derivedKey, normal salt, SHA-1, with normal info with wrong (ECDH) key",0,{},{}],["Derived key of type name: HMAC hash: SHA-384 length: 256 using long derivedKey, normal salt, SHA-1, with normal info",0,{},{}],["Derived key of type name: HMAC hash: SHA-384 length: 256 using long derivedKey, normal salt, SHA-1, with normal info with bad hash name SHA1",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: HMAC hash: SHA-384 length: 256 using long derivedKey, normal salt, SHA-1, with normal info with missing deriveKey usage",0,{},{}],["Derived key of type name: HMAC hash: SHA-384 length: 256 using long derivedKey, normal salt, SHA-1, with normal info with wrong (ECDH) key",0,{},{}],["Derived key of type name: HMAC hash: SHA-512 length: 256 using long derivedKey, normal salt, SHA-1, with normal info",0,{},{}],["Derived key of type name: HMAC hash: SHA-512 length: 256 using long derivedKey, normal salt, SHA-1, with normal info with bad hash name SHA1",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: HMAC hash: SHA-512 length: 256 using long derivedKey, normal salt, SHA-1, with normal info with missing deriveKey usage",0,{},{}],["Derived key of type name: HMAC hash: SHA-512 length: 256 using long derivedKey, normal salt, SHA-1, with normal info with wrong (ECDH) key",0,{},{}],["long derivedKey, normal salt, SHA-1, with normal info with missing salt",1,"assert_equals: deriveBits missing salt correctly threw OperationError: An invalid or illegal string was specified expected \"TypeError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:128:33\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:124:36\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:123:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["long derivedKey, normal salt, SHA-1, with normal info with missing info",1,"assert_equals: deriveBits missing info correctly threw OperationError: An invalid or illegal string was specified expected \"TypeError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:138:33\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:134:36\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:133:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["long derivedKey, normal salt, SHA-1, with normal info with null length",1,"assert_equals: deriveBits with null length correctly threw OperationError: Data provided to an operation does not meet requirements expected \"TypeError\" but got \"DataError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:148:33\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:144:36\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:143:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["long derivedKey, normal salt, SHA-1, with normal info with non-multiple of 8 length",1,"assert_unreached: non-multiple of 8 length should have thrown an OperationError Reached unreachable code","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:156:33\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:154:36\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:153:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["long derivedKey, normal salt, SHA-1, with normal info with bad hash name SHA1",1,"assert_equals: deriveBits with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:170:33\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:166:36\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:164:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["long derivedKey, normal salt, SHA-1, with normal info with missing deriveBits usage",0,{},{}],["long derivedKey, normal salt, SHA-1, with normal info with wrong (ECDH) key",0,{},{}],["long derivedKey, normal salt, SHA-1, with empty info",0,{},{}],["long derivedKey, normal salt, SHA-1, with empty info with 0 length",1,"assert_equals: deriveBits with 0 length correctly threw OperationError: Data provided to an operation does not meet requirements expected \"OperationError\" but got \"DataError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:54:33\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:50:36\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:49:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-CBC length: 128 using long derivedKey, normal salt, SHA-1, with empty info",0,{},{}],["Derived key of type name: AES-CBC length: 128 using long derivedKey, normal salt, SHA-1, with empty info with bad hash name SHA1",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-CBC length: 128 using long derivedKey, normal salt, SHA-1, with empty info with missing deriveKey usage",0,{},{}],["Derived key of type name: AES-CBC length: 128 using long derivedKey, normal salt, SHA-1, with empty info with wrong (ECDH) key",0,{},{}],["Derived key of type name: AES-CBC length: 192 using long derivedKey, normal salt, SHA-1, with empty info",0,{},{}],["Derived key of type name: AES-CBC length: 192 using long derivedKey, normal salt, SHA-1, with empty info with bad hash name SHA1",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-CBC length: 192 using long derivedKey, normal salt, SHA-1, with empty info with missing deriveKey usage",0,{},{}],["Derived key of type name: AES-CBC length: 192 using long derivedKey, normal salt, SHA-1, with empty info with wrong (ECDH) key",0,{},{}],["Derived key of type name: AES-CBC length: 256 using long derivedKey, normal salt, SHA-1, with empty info",0,{},{}],["Derived key of type name: AES-CBC length: 256 using long derivedKey, normal salt, SHA-1, with empty info with bad hash name SHA1",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-CBC length: 256 using long derivedKey, normal salt, SHA-1, with empty info with missing deriveKey usage",0,{},{}],["Derived key of type name: AES-CBC length: 256 using long derivedKey, normal salt, SHA-1, with empty info with wrong (ECDH) key",0,{},{}],["Derived key of type name: AES-CTR length: 128 using long derivedKey, normal salt, SHA-1, with empty info",0,{},{}],["Derived key of type name: AES-CTR length: 128 using long derivedKey, normal salt, SHA-1, with empty info with bad hash name SHA1",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-CTR length: 128 using long derivedKey, normal salt, SHA-1, with empty info with missing deriveKey usage",0,{},{}],["Derived key of type name: AES-CTR length: 128 using long derivedKey, normal salt, SHA-1, with empty info with wrong (ECDH) key",0,{},{}],["Derived key of type name: AES-CTR length: 192 using long derivedKey, normal salt, SHA-1, with empty info",0,{},{}],["Derived key of type name: AES-CTR length: 192 using long derivedKey, normal salt, SHA-1, with empty info with bad hash name SHA1",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-CTR length: 192 using long derivedKey, normal salt, SHA-1, with empty info with missing deriveKey usage",0,{},{}],["Derived key of type name: AES-CTR length: 192 using long derivedKey, normal salt, SHA-1, with empty info with wrong (ECDH) key",0,{},{}],["Derived key of type name: AES-CTR length: 256 using long derivedKey, normal salt, SHA-1, with empty info",0,{},{}],["Derived key of type name: AES-CTR length: 256 using long derivedKey, normal salt, SHA-1, with empty info with bad hash name SHA1",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-CTR length: 256 using long derivedKey, normal salt, SHA-1, with empty info with missing deriveKey usage",0,{},{}],["Derived key of type name: AES-CTR length: 256 using long derivedKey, normal salt, SHA-1, with empty info with wrong (ECDH) key",0,{},{}],["Derived key of type name: AES-GCM length: 128 using long derivedKey, normal salt, SHA-1, with empty info",0,{},{}],["Derived key of type name: AES-GCM length: 128 using long derivedKey, normal salt, SHA-1, with empty info with bad hash name SHA1",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-GCM length: 128 using long derivedKey, normal salt, SHA-1, with empty info with missing deriveKey usage",0,{},{}],["Derived key of type name: AES-GCM length: 128 using long derivedKey, normal salt, SHA-1, with empty info with wrong (ECDH) key",0,{},{}],["Derived key of type name: AES-GCM length: 192 using long derivedKey, normal salt, SHA-1, with empty info",0,{},{}],["Derived key of type name: AES-GCM length: 192 using long derivedKey, normal salt, SHA-1, with empty info with bad hash name SHA1",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-GCM length: 192 using long derivedKey, normal salt, SHA-1, with empty info with missing deriveKey usage",0,{},{}],["Derived key of type name: AES-GCM length: 192 using long derivedKey, normal salt, SHA-1, with empty info with wrong (ECDH) key",0,{},{}],["Derived key of type name: AES-GCM length: 256 using long derivedKey, normal salt, SHA-1, with empty info",0,{},{}],["Derived key of type name: AES-GCM length: 256 using long derivedKey, normal salt, SHA-1, with empty info with bad hash name SHA1",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-GCM length: 256 using long derivedKey, normal salt, SHA-1, with empty info with missing deriveKey usage",0,{},{}],["Derived key of type name: AES-GCM length: 256 using long derivedKey, normal salt, SHA-1, with empty info with wrong (ECDH) key",0,{},{}],["Derived key of type name: AES-KW length: 128 using long derivedKey, normal salt, SHA-1, with empty info",0,{},{}],["Derived key of type name: AES-KW length: 128 using long derivedKey, normal salt, SHA-1, with empty info with bad hash name SHA1",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-KW length: 128 using long derivedKey, normal salt, SHA-1, with empty info with missing deriveKey usage",0,{},{}],["Derived key of type name: AES-KW length: 128 using long derivedKey, normal salt, SHA-1, with empty info with wrong (ECDH) key",0,{},{}],["Derived key of type name: AES-KW length: 192 using long derivedKey, normal salt, SHA-1, with empty info",0,{},{}],["Derived key of type name: AES-KW length: 192 using long derivedKey, normal salt, SHA-1, with empty info with bad hash name SHA1",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-KW length: 192 using long derivedKey, normal salt, SHA-1, with empty info with missing deriveKey usage",0,{},{}],["Derived key of type name: AES-KW length: 192 using long derivedKey, normal salt, SHA-1, with empty info with wrong (ECDH) key",0,{},{}],["Derived key of type name: AES-KW length: 256 using long derivedKey, normal salt, SHA-1, with empty info",0,{},{}],["Derived key of type name: AES-KW length: 256 using long derivedKey, normal salt, SHA-1, with empty info with bad hash name SHA1",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-KW length: 256 using long derivedKey, normal salt, SHA-1, with empty info with missing deriveKey usage",0,{},{}],["Derived key of type name: AES-KW length: 256 using long derivedKey, normal salt, SHA-1, with empty info with wrong (ECDH) key",0,{},{}],["Derived key of type name: HMAC hash: SHA-1 length: 256 using long derivedKey, normal salt, SHA-1, with empty info",0,{},{}],["Derived key of type name: HMAC hash: SHA-1 length: 256 using long derivedKey, normal salt, SHA-1, with empty info with bad hash name SHA1",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: HMAC hash: SHA-1 length: 256 using long derivedKey, normal salt, SHA-1, with empty info with missing deriveKey usage",0,{},{}],["Derived key of type name: HMAC hash: SHA-1 length: 256 using long derivedKey, normal salt, SHA-1, with empty info with wrong (ECDH) key",0,{},{}],["Derived key of type name: HMAC hash: SHA-256 length: 256 using long derivedKey, normal salt, SHA-1, with empty info",0,{},{}],["Derived key of type name: HMAC hash: SHA-256 length: 256 using long derivedKey, normal salt, SHA-1, with empty info with bad hash name SHA1",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: HMAC hash: SHA-256 length: 256 using long derivedKey, normal salt, SHA-1, with empty info with missing deriveKey usage",0,{},{}],["Derived key of type name: HMAC hash: SHA-256 length: 256 using long derivedKey, normal salt, SHA-1, with empty info with wrong (ECDH) key",0,{},{}],["Derived key of type name: HMAC hash: SHA-384 length: 256 using long derivedKey, normal salt, SHA-1, with empty info",0,{},{}],["Derived key of type name: HMAC hash: SHA-384 length: 256 using long derivedKey, normal salt, SHA-1, with empty info with bad hash name SHA1",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: HMAC hash: SHA-384 length: 256 using long derivedKey, normal salt, SHA-1, with empty info with missing deriveKey usage",0,{},{}],["Derived key of type name: HMAC hash: SHA-384 length: 256 using long derivedKey, normal salt, SHA-1, with empty info with wrong (ECDH) key",0,{},{}],["Derived key of type name: HMAC hash: SHA-512 length: 256 using long derivedKey, normal salt, SHA-1, with empty info",0,{},{}],["Derived key of type name: HMAC hash: SHA-512 length: 256 using long derivedKey, normal salt, SHA-1, with empty info with bad hash name SHA1",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: HMAC hash: SHA-512 length: 256 using long derivedKey, normal salt, SHA-1, with empty info with missing deriveKey usage",0,{},{}],["Derived key of type name: HMAC hash: SHA-512 length: 256 using long derivedKey, normal salt, SHA-1, with empty info with wrong (ECDH) key",0,{},{}],["long derivedKey, normal salt, SHA-1, with empty info with missing salt",1,"assert_equals: deriveBits missing salt correctly threw OperationError: An invalid or illegal string was specified expected \"TypeError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:128:33\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:124:36\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:123:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["long derivedKey, normal salt, SHA-1, with empty info with missing info",1,"assert_equals: deriveBits missing info correctly threw OperationError: An invalid or illegal string was specified expected \"TypeError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:138:33\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:134:36\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:133:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["long derivedKey, normal salt, SHA-1, with empty info with null length",1,"assert_equals: deriveBits with null length correctly threw OperationError: Data provided to an operation does not meet requirements expected \"TypeError\" but got \"DataError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:148:33\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:144:36\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:143:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["long derivedKey, normal salt, SHA-1, with empty info with non-multiple of 8 length",1,"assert_unreached: non-multiple of 8 length should have thrown an OperationError Reached unreachable code","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:156:33\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:154:36\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:153:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["long derivedKey, normal salt, SHA-1, with empty info with bad hash name SHA1",1,"assert_equals: deriveBits with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:170:33\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:166:36\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:164:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["long derivedKey, normal salt, SHA-1, with empty info with missing deriveBits usage",0,{},{}],["long derivedKey, normal salt, SHA-1, with empty info with wrong (ECDH) key",0,{},{}],["long derivedKey, normal salt, SHA-256, with normal info",0,{},{}],["long derivedKey, normal salt, SHA-256, with normal info with 0 length",1,"assert_equals: deriveBits with 0 length correctly threw OperationError: Data provided to an operation does not meet requirements expected \"OperationError\" but got \"DataError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:54:33\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:50:36\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:49:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-CBC length: 128 using long derivedKey, normal salt, SHA-256, with normal info",0,{},{}],["Derived key of type name: AES-CBC length: 128 using long derivedKey, normal salt, SHA-256, with normal info with bad hash name SHA256",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-CBC length: 128 using long derivedKey, normal salt, SHA-256, with normal info with missing deriveKey usage",0,{},{}],["Derived key of type name: AES-CBC length: 128 using long derivedKey, normal salt, SHA-256, with normal info with wrong (ECDH) key",0,{},{}],["Derived key of type name: AES-CBC length: 192 using long derivedKey, normal salt, SHA-256, with normal info",0,{},{}],["Derived key of type name: AES-CBC length: 192 using long derivedKey, normal salt, SHA-256, with normal info with bad hash name SHA256",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-CBC length: 192 using long derivedKey, normal salt, SHA-256, with normal info with missing deriveKey usage",0,{},{}],["Derived key of type name: AES-CBC length: 192 using long derivedKey, normal salt, SHA-256, with normal info with wrong (ECDH) key",0,{},{}],["Derived key of type name: AES-CBC length: 256 using long derivedKey, normal salt, SHA-256, with normal info",0,{},{}],["Derived key of type name: AES-CBC length: 256 using long derivedKey, normal salt, SHA-256, with normal info with bad hash name SHA256",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-CBC length: 256 using long derivedKey, normal salt, SHA-256, with normal info with missing deriveKey usage",0,{},{}],["Derived key of type name: AES-CBC length: 256 using long derivedKey, normal salt, SHA-256, with normal info with wrong (ECDH) key",0,{},{}],["Derived key of type name: AES-CTR length: 128 using long derivedKey, normal salt, SHA-256, with normal info",0,{},{}],["Derived key of type name: AES-CTR length: 128 using long derivedKey, normal salt, SHA-256, with normal info with bad hash name SHA256",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-CTR length: 128 using long derivedKey, normal salt, SHA-256, with normal info with missing deriveKey usage",0,{},{}],["Derived key of type name: AES-CTR length: 128 using long derivedKey, normal salt, SHA-256, with normal info with wrong (ECDH) key",0,{},{}],["Derived key of type name: AES-CTR length: 192 using long derivedKey, normal salt, SHA-256, with normal info",0,{},{}],["Derived key of type name: AES-CTR length: 192 using long derivedKey, normal salt, SHA-256, with normal info with bad hash name SHA256",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-CTR length: 192 using long derivedKey, normal salt, SHA-256, with normal info with missing deriveKey usage",0,{},{}],["Derived key of type name: AES-CTR length: 192 using long derivedKey, normal salt, SHA-256, with normal info with wrong (ECDH) key",0,{},{}],["Derived key of type name: AES-CTR length: 256 using long derivedKey, normal salt, SHA-256, with normal info",0,{},{}],["Derived key of type name: AES-CTR length: 256 using long derivedKey, normal salt, SHA-256, with normal info with bad hash name SHA256",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-CTR length: 256 using long derivedKey, normal salt, SHA-256, with normal info with missing deriveKey usage",0,{},{}],["Derived key of type name: AES-CTR length: 256 using long derivedKey, normal salt, SHA-256, with normal info with wrong (ECDH) key",0,{},{}],["Derived key of type name: AES-GCM length: 128 using long derivedKey, normal salt, SHA-256, with normal info",0,{},{}],["Derived key of type name: AES-GCM length: 128 using long derivedKey, normal salt, SHA-256, with normal info with bad hash name SHA256",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-GCM length: 128 using long derivedKey, normal salt, SHA-256, with normal info with missing deriveKey usage",0,{},{}],["Derived key of type name: AES-GCM length: 128 using long derivedKey, normal salt, SHA-256, with normal info with wrong (ECDH) key",0,{},{}],["Derived key of type name: AES-GCM length: 192 using long derivedKey, normal salt, SHA-256, with normal info",0,{},{}],["Derived key of type name: AES-GCM length: 192 using long derivedKey, normal salt, SHA-256, with normal info with bad hash name SHA256",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-GCM length: 192 using long derivedKey, normal salt, SHA-256, with normal info with missing deriveKey usage",0,{},{}],["Derived key of type name: AES-GCM length: 192 using long derivedKey, normal salt, SHA-256, with normal info with wrong (ECDH) key",0,{},{}],["Derived key of type name: AES-GCM length: 256 using long derivedKey, normal salt, SHA-256, with normal info",0,{},{}],["Derived key of type name: AES-GCM length: 256 using long derivedKey, normal salt, SHA-256, with normal info with bad hash name SHA256",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-GCM length: 256 using long derivedKey, normal salt, SHA-256, with normal info with missing deriveKey usage",0,{},{}],["Derived key of type name: AES-GCM length: 256 using long derivedKey, normal salt, SHA-256, with normal info with wrong (ECDH) key",0,{},{}],["Derived key of type name: AES-KW length: 128 using long derivedKey, normal salt, SHA-256, with normal info",0,{},{}],["Derived key of type name: AES-KW length: 128 using long derivedKey, normal salt, SHA-256, with normal info with bad hash name SHA256",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-KW length: 128 using long derivedKey, normal salt, SHA-256, with normal info with missing deriveKey usage",0,{},{}],["Derived key of type name: AES-KW length: 128 using long derivedKey, normal salt, SHA-256, with normal info with wrong (ECDH) key",0,{},{}],["Derived key of type name: AES-KW length: 192 using long derivedKey, normal salt, SHA-256, with normal info",0,{},{}],["Derived key of type name: AES-KW length: 192 using long derivedKey, normal salt, SHA-256, with normal info with bad hash name SHA256",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-KW length: 192 using long derivedKey, normal salt, SHA-256, with normal info with missing deriveKey usage",0,{},{}],["Derived key of type name: AES-KW length: 192 using long derivedKey, normal salt, SHA-256, with normal info with wrong (ECDH) key",0,{},{}],["Derived key of type name: AES-KW length: 256 using long derivedKey, normal salt, SHA-256, with normal info",0,{},{}],["Derived key of type name: AES-KW length: 256 using long derivedKey, normal salt, SHA-256, with normal info with bad hash name SHA256",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-KW length: 256 using long derivedKey, normal salt, SHA-256, with normal info with missing deriveKey usage",0,{},{}],["Derived key of type name: AES-KW length: 256 using long derivedKey, normal salt, SHA-256, with normal info with wrong (ECDH) key",0,{},{}],["Derived key of type name: HMAC hash: SHA-1 length: 256 using long derivedKey, normal salt, SHA-256, with normal info",0,{},{}],["Derived key of type name: HMAC hash: SHA-1 length: 256 using long derivedKey, normal salt, SHA-256, with normal info with bad hash name SHA256",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: HMAC hash: SHA-1 length: 256 using long derivedKey, normal salt, SHA-256, with normal info with missing deriveKey usage",0,{},{}],["Derived key of type name: HMAC hash: SHA-1 length: 256 using long derivedKey, normal salt, SHA-256, with normal info with wrong (ECDH) key",0,{},{}],["Derived key of type name: HMAC hash: SHA-256 length: 256 using long derivedKey, normal salt, SHA-256, with normal info",0,{},{}],["Derived key of type name: HMAC hash: SHA-256 length: 256 using long derivedKey, normal salt, SHA-256, with normal info with bad hash name SHA256",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: HMAC hash: SHA-256 length: 256 using long derivedKey, normal salt, SHA-256, with normal info with missing deriveKey usage",0,{},{}],["Derived key of type name: HMAC hash: SHA-256 length: 256 using long derivedKey, normal salt, SHA-256, with normal info with wrong (ECDH) key",0,{},{}],["Derived key of type name: HMAC hash: SHA-384 length: 256 using long derivedKey, normal salt, SHA-256, with normal info",0,{},{}],["Derived key of type name: HMAC hash: SHA-384 length: 256 using long derivedKey, normal salt, SHA-256, with normal info with bad hash name SHA256",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: HMAC hash: SHA-384 length: 256 using long derivedKey, normal salt, SHA-256, with normal info with missing deriveKey usage",0,{},{}],["Derived key of type name: HMAC hash: SHA-384 length: 256 using long derivedKey, normal salt, SHA-256, with normal info with wrong (ECDH) key",0,{},{}],["Derived key of type name: HMAC hash: SHA-512 length: 256 using long derivedKey, normal salt, SHA-256, with normal info",0,{},{}],["Derived key of type name: HMAC hash: SHA-512 length: 256 using long derivedKey, normal salt, SHA-256, with normal info with bad hash name SHA256",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: HMAC hash: SHA-512 length: 256 using long derivedKey, normal salt, SHA-256, with normal info with missing deriveKey usage",0,{},{}],["Derived key of type name: HMAC hash: SHA-512 length: 256 using long derivedKey, normal salt, SHA-256, with normal info with wrong (ECDH) key",0,{},{}],["long derivedKey, normal salt, SHA-256, with normal info with missing salt",1,"assert_equals: deriveBits missing salt correctly threw OperationError: An invalid or illegal string was specified expected \"TypeError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:128:33\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:124:36\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:123:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["long derivedKey, normal salt, SHA-256, with normal info with missing info",1,"assert_equals: deriveBits missing info correctly threw OperationError: An invalid or illegal string was specified expected \"TypeError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:138:33\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:134:36\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:133:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["long derivedKey, normal salt, SHA-256, with normal info with null length",1,"assert_equals: deriveBits with null length correctly threw OperationError: Data provided to an operation does not meet requirements expected \"TypeError\" but got \"DataError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:148:33\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:144:36\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:143:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["long derivedKey, normal salt, SHA-256, with normal info with non-multiple of 8 length",1,"assert_unreached: non-multiple of 8 length should have thrown an OperationError Reached unreachable code","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:156:33\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:154:36\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:153:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["long derivedKey, normal salt, SHA-256, with normal info with bad hash name SHA256",1,"assert_equals: deriveBits with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:170:33\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:166:36\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:164:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["long derivedKey, normal salt, SHA-256, with normal info with missing deriveBits usage",0,{},{}],["long derivedKey, normal salt, SHA-256, with normal info with wrong (ECDH) key",0,{},{}],["long derivedKey, normal salt, SHA-256, with empty info",0,{},{}],["long derivedKey, normal salt, SHA-256, with empty info with 0 length",1,"assert_equals: deriveBits with 0 length correctly threw OperationError: Data provided to an operation does not meet requirements expected \"OperationError\" but got \"DataError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:54:33\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:50:36\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:49:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-CBC length: 128 using long derivedKey, normal salt, SHA-256, with empty info",0,{},{}],["Derived key of type name: AES-CBC length: 128 using long derivedKey, normal salt, SHA-256, with empty info with bad hash name SHA256",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-CBC length: 128 using long derivedKey, normal salt, SHA-256, with empty info with missing deriveKey usage",0,{},{}],["Derived key of type name: AES-CBC length: 128 using long derivedKey, normal salt, SHA-256, with empty info with wrong (ECDH) key",0,{},{}],["Derived key of type name: AES-CBC length: 192 using long derivedKey, normal salt, SHA-256, with empty info",0,{},{}],["Derived key of type name: AES-CBC length: 192 using long derivedKey, normal salt, SHA-256, with empty info with bad hash name SHA256",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-CBC length: 192 using long derivedKey, normal salt, SHA-256, with empty info with missing deriveKey usage",0,{},{}],["Derived key of type name: AES-CBC length: 192 using long derivedKey, normal salt, SHA-256, with empty info with wrong (ECDH) key",0,{},{}],["Derived key of type name: AES-CBC length: 256 using long derivedKey, normal salt, SHA-256, with empty info",0,{},{}],["Derived key of type name: AES-CBC length: 256 using long derivedKey, normal salt, SHA-256, with empty info with bad hash name SHA256",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-CBC length: 256 using long derivedKey, normal salt, SHA-256, with empty info with missing deriveKey usage",0,{},{}],["Derived key of type name: AES-CBC length: 256 using long derivedKey, normal salt, SHA-256, with empty info with wrong (ECDH) key",0,{},{}],["Derived key of type name: AES-CTR length: 128 using long derivedKey, normal salt, SHA-256, with empty info",0,{},{}],["Derived key of type name: AES-CTR length: 128 using long derivedKey, normal salt, SHA-256, with empty info with bad hash name SHA256",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-CTR length: 128 using long derivedKey, normal salt, SHA-256, with empty info with missing deriveKey usage",0,{},{}],["Derived key of type name: AES-CTR length: 128 using long derivedKey, normal salt, SHA-256, with empty info with wrong (ECDH) key",0,{},{}],["Derived key of type name: AES-CTR length: 192 using long derivedKey, normal salt, SHA-256, with empty info",0,{},{}],["Derived key of type name: AES-CTR length: 192 using long derivedKey, normal salt, SHA-256, with empty info with bad hash name SHA256",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-CTR length: 192 using long derivedKey, normal salt, SHA-256, with empty info with missing deriveKey usage",0,{},{}],["Derived key of type name: AES-CTR length: 192 using long derivedKey, normal salt, SHA-256, with empty info with wrong (ECDH) key",0,{},{}],["Derived key of type name: AES-CTR length: 256 using long derivedKey, normal salt, SHA-256, with empty info",0,{},{}],["Derived key of type name: AES-CTR length: 256 using long derivedKey, normal salt, SHA-256, with empty info with bad hash name SHA256",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-CTR length: 256 using long derivedKey, normal salt, SHA-256, with empty info with missing deriveKey usage",0,{},{}],["Derived key of type name: AES-CTR length: 256 using long derivedKey, normal salt, SHA-256, with empty info with wrong (ECDH) key",0,{},{}],["Derived key of type name: AES-GCM length: 128 using long derivedKey, normal salt, SHA-256, with empty info",0,{},{}],["Derived key of type name: AES-GCM length: 128 using long derivedKey, normal salt, SHA-256, with empty info with bad hash name SHA256",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-GCM length: 128 using long derivedKey, normal salt, SHA-256, with empty info with missing deriveKey usage",0,{},{}],["Derived key of type name: AES-GCM length: 128 using long derivedKey, normal salt, SHA-256, with empty info with wrong (ECDH) key",0,{},{}],["Derived key of type name: AES-GCM length: 192 using long derivedKey, normal salt, SHA-256, with empty info",0,{},{}],["Derived key of type name: AES-GCM length: 192 using long derivedKey, normal salt, SHA-256, with empty info with bad hash name SHA256",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-GCM length: 192 using long derivedKey, normal salt, SHA-256, with empty info with missing deriveKey usage",0,{},{}],["Derived key of type name: AES-GCM length: 192 using long derivedKey, normal salt, SHA-256, with empty info with wrong (ECDH) key",0,{},{}],["Derived key of type name: AES-GCM length: 256 using long derivedKey, normal salt, SHA-256, with empty info",0,{},{}],["Derived key of type name: AES-GCM length: 256 using long derivedKey, normal salt, SHA-256, with empty info with bad hash name SHA256",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-GCM length: 256 using long derivedKey, normal salt, SHA-256, with empty info with missing deriveKey usage",0,{},{}],["Derived key of type name: AES-GCM length: 256 using long derivedKey, normal salt, SHA-256, with empty info with wrong (ECDH) key",0,{},{}],["Derived key of type name: AES-KW length: 128 using long derivedKey, normal salt, SHA-256, with empty info",0,{},{}],["Derived key of type name: AES-KW length: 128 using long derivedKey, normal salt, SHA-256, with empty info with bad hash name SHA256",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-KW length: 128 using long derivedKey, normal salt, SHA-256, with empty info with missing deriveKey usage",0,{},{}],["Derived key of type name: AES-KW length: 128 using long derivedKey, normal salt, SHA-256, with empty info with wrong (ECDH) key",0,{},{}],["Derived key of type name: AES-KW length: 192 using long derivedKey, normal salt, SHA-256, with empty info",0,{},{}],["Derived key of type name: AES-KW length: 192 using long derivedKey, normal salt, SHA-256, with empty info with bad hash name SHA256",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-KW length: 192 using long derivedKey, normal salt, SHA-256, with empty info with missing deriveKey usage",0,{},{}],["Derived key of type name: AES-KW length: 192 using long derivedKey, normal salt, SHA-256, with empty info with wrong (ECDH) key",0,{},{}],["Derived key of type name: AES-KW length: 256 using long derivedKey, normal salt, SHA-256, with empty info",0,{},{}],["Derived key of type name: AES-KW length: 256 using long derivedKey, normal salt, SHA-256, with empty info with bad hash name SHA256",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-KW length: 256 using long derivedKey, normal salt, SHA-256, with empty info with missing deriveKey usage",0,{},{}],["Derived key of type name: AES-KW length: 256 using long derivedKey, normal salt, SHA-256, with empty info with wrong (ECDH) key",0,{},{}],["Derived key of type name: HMAC hash: SHA-1 length: 256 using long derivedKey, normal salt, SHA-256, with empty info",0,{},{}],["Derived key of type name: HMAC hash: SHA-1 length: 256 using long derivedKey, normal salt, SHA-256, with empty info with bad hash name SHA256",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: HMAC hash: SHA-1 length: 256 using long derivedKey, normal salt, SHA-256, with empty info with missing deriveKey usage",0,{},{}],["Derived key of type name: HMAC hash: SHA-1 length: 256 using long derivedKey, normal salt, SHA-256, with empty info with wrong (ECDH) key",0,{},{}],["Derived key of type name: HMAC hash: SHA-256 length: 256 using long derivedKey, normal salt, SHA-256, with empty info",0,{},{}],["Derived key of type name: HMAC hash: SHA-256 length: 256 using long derivedKey, normal salt, SHA-256, with empty info with bad hash name SHA256",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: HMAC hash: SHA-256 length: 256 using long derivedKey, normal salt, SHA-256, with empty info with missing deriveKey usage",0,{},{}],["Derived key of type name: HMAC hash: SHA-256 length: 256 using long derivedKey, normal salt, SHA-256, with empty info with wrong (ECDH) key",0,{},{}],["Derived key of type name: HMAC hash: SHA-384 length: 256 using long derivedKey, normal salt, SHA-256, with empty info",0,{},{}],["Derived key of type name: HMAC hash: SHA-384 length: 256 using long derivedKey, normal salt, SHA-256, with empty info with bad hash name SHA256",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: HMAC hash: SHA-384 length: 256 using long derivedKey, normal salt, SHA-256, with empty info with missing deriveKey usage",0,{},{}],["Derived key of type name: HMAC hash: SHA-384 length: 256 using long derivedKey, normal salt, SHA-256, with empty info with wrong (ECDH) key",0,{},{}],["Derived key of type name: HMAC hash: SHA-512 length: 256 using long derivedKey, normal salt, SHA-256, with empty info",0,{},{}],["Derived key of type name: HMAC hash: SHA-512 length: 256 using long derivedKey, normal salt, SHA-256, with empty info with bad hash name SHA256",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: HMAC hash: SHA-512 length: 256 using long derivedKey, normal salt, SHA-256, with empty info with missing deriveKey usage",0,{},{}],["Derived key of type name: HMAC hash: SHA-512 length: 256 using long derivedKey, normal salt, SHA-256, with empty info with wrong (ECDH) key",0,{},{}],["long derivedKey, normal salt, SHA-256, with empty info with missing salt",1,"assert_equals: deriveBits missing salt correctly threw OperationError: An invalid or illegal string was specified expected \"TypeError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:128:33\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:124:36\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:123:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["long derivedKey, normal salt, SHA-256, with empty info with missing info",1,"assert_equals: deriveBits missing info correctly threw OperationError: An invalid or illegal string was specified expected \"TypeError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:138:33\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:134:36\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:133:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["long derivedKey, normal salt, SHA-256, with empty info with null length",1,"assert_equals: deriveBits with null length correctly threw OperationError: Data provided to an operation does not meet requirements expected \"TypeError\" but got \"DataError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:148:33\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:144:36\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:143:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["long derivedKey, normal salt, SHA-256, with empty info with non-multiple of 8 length",1,"assert_unreached: non-multiple of 8 length should have thrown an OperationError Reached unreachable code","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:156:33\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:154:36\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:153:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["long derivedKey, normal salt, SHA-256, with empty info with bad hash name SHA256",1,"assert_equals: deriveBits with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:170:33\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:166:36\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:164:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["long derivedKey, normal salt, SHA-256, with empty info with missing deriveBits usage",0,{},{}],["long derivedKey, normal salt, SHA-256, with empty info with wrong (ECDH) key",0,{},{}],["long derivedKey, normal salt, PBKDF2, with normal info with non-digest algorithm PBKDF2",0,{},{}],["Derived key of type name: AES-CBC length: 128 using long derivedKey, normal salt, PBKDF2, with normal info",0,{},{}],["Derived key of type name: AES-CBC length: 192 using long derivedKey, normal salt, PBKDF2, with normal info",0,{},{}],["Derived key of type name: AES-CBC length: 256 using long derivedKey, normal salt, PBKDF2, with normal info",0,{},{}],["Derived key of type name: AES-CTR length: 128 using long derivedKey, normal salt, PBKDF2, with normal info",0,{},{}],["Derived key of type name: AES-CTR length: 192 using long derivedKey, normal salt, PBKDF2, with normal info",0,{},{}],["Derived key of type name: AES-CTR length: 256 using long derivedKey, normal salt, PBKDF2, with normal info",0,{},{}],["Derived key of type name: AES-GCM length: 128 using long derivedKey, normal salt, PBKDF2, with normal info",0,{},{}],["Derived key of type name: AES-GCM length: 192 using long derivedKey, normal salt, PBKDF2, with normal info",0,{},{}],["Derived key of type name: AES-GCM length: 256 using long derivedKey, normal salt, PBKDF2, with normal info",0,{},{}],["Derived key of type name: AES-KW length: 128 using long derivedKey, normal salt, PBKDF2, with normal info",0,{},{}],["Derived key of type name: AES-KW length: 192 using long derivedKey, normal salt, PBKDF2, with normal info",0,{},{}],["Derived key of type name: AES-KW length: 256 using long derivedKey, normal salt, PBKDF2, with normal info",0,{},{}],["Derived key of type name: HMAC hash: SHA-1 length: 256 using long derivedKey, normal salt, PBKDF2, with normal info",0,{},{}],["Derived key of type name: HMAC hash: SHA-256 length: 256 using long derivedKey, normal salt, PBKDF2, with normal info",0,{},{}],["Derived key of type name: HMAC hash: SHA-384 length: 256 using long derivedKey, normal salt, PBKDF2, with normal info",0,{},{}],["Derived key of type name: HMAC hash: SHA-512 length: 256 using long derivedKey, normal salt, PBKDF2, with normal info",0,{},{}],["long derivedKey, normal salt, PBKDF2, with empty info with non-digest algorithm PBKDF2",0,{},{}],["Derived key of type name: AES-CBC length: 128 using long derivedKey, normal salt, PBKDF2, with empty info",0,{},{}],["Derived key of type name: AES-CBC length: 192 using long derivedKey, normal salt, PBKDF2, with empty info",0,{},{}],["Derived key of type name: AES-CBC length: 256 using long derivedKey, normal salt, PBKDF2, with empty info",0,{},{}],["Derived key of type name: AES-CTR length: 128 using long derivedKey, normal salt, PBKDF2, with empty info",0,{},{}],["Derived key of type name: AES-CTR length: 192 using long derivedKey, normal salt, PBKDF2, with empty info",0,{},{}],["Derived key of type name: AES-CTR length: 256 using long derivedKey, normal salt, PBKDF2, with empty info",0,{},{}],["Derived key of type name: AES-GCM length: 128 using long derivedKey, normal salt, PBKDF2, with empty info",0,{},{}],["Derived key of type name: AES-GCM length: 192 using long derivedKey, normal salt, PBKDF2, with empty info",0,{},{}],["Derived key of type name: AES-GCM length: 256 using long derivedKey, normal salt, PBKDF2, with empty info",0,{},{}],["Derived key of type name: AES-KW length: 128 using long derivedKey, normal salt, PBKDF2, with empty info",0,{},{}],["Derived key of type name: AES-KW length: 192 using long derivedKey, normal salt, PBKDF2, with empty info",0,{},{}],["Derived key of type name: AES-KW length: 256 using long derivedKey, normal salt, PBKDF2, with empty info",0,{},{}],["Derived key of type name: HMAC hash: SHA-1 length: 256 using long derivedKey, normal salt, PBKDF2, with empty info",0,{},{}],["Derived key of type name: HMAC hash: SHA-256 length: 256 using long derivedKey, normal salt, PBKDF2, with empty info",0,{},{}],["Derived key of type name: HMAC hash: SHA-384 length: 256 using long derivedKey, normal salt, PBKDF2, with empty info",0,{},{}],["Derived key of type name: HMAC hash: SHA-512 length: 256 using long derivedKey, normal salt, PBKDF2, with empty info",0,{},{}],["long derivedKey, empty salt, SHA-384, with normal info",0,{},{}],["long derivedKey, empty salt, SHA-384, with normal info with 0 length",1,"assert_equals: deriveBits with 0 length correctly threw OperationError: Data provided to an operation does not meet requirements expected \"OperationError\" but got \"DataError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:54:33\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:50:36\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:49:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-CBC length: 128 using long derivedKey, empty salt, SHA-384, with normal info",0,{},{}],["Derived key of type name: AES-CBC length: 128 using long derivedKey, empty salt, SHA-384, with normal info with bad hash name SHA384",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-CBC length: 128 using long derivedKey, empty salt, SHA-384, with normal info with missing deriveKey usage",0,{},{}],["Derived key of type name: AES-CBC length: 128 using long derivedKey, empty salt, SHA-384, with normal info with wrong (ECDH) key",0,{},{}],["Derived key of type name: AES-CBC length: 192 using long derivedKey, empty salt, SHA-384, with normal info",0,{},{}],["Derived key of type name: AES-CBC length: 192 using long derivedKey, empty salt, SHA-384, with normal info with bad hash name SHA384",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-CBC length: 192 using long derivedKey, empty salt, SHA-384, with normal info with missing deriveKey usage",0,{},{}],["Derived key of type name: AES-CBC length: 192 using long derivedKey, empty salt, SHA-384, with normal info with wrong (ECDH) key",0,{},{}],["Derived key of type name: AES-CBC length: 256 using long derivedKey, empty salt, SHA-384, with normal info",0,{},{}],["Derived key of type name: AES-CBC length: 256 using long derivedKey, empty salt, SHA-384, with normal info with bad hash name SHA384",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-CBC length: 256 using long derivedKey, empty salt, SHA-384, with normal info with missing deriveKey usage",0,{},{}],["Derived key of type name: AES-CBC length: 256 using long derivedKey, empty salt, SHA-384, with normal info with wrong (ECDH) key",0,{},{}],["Derived key of type name: AES-CTR length: 128 using long derivedKey, empty salt, SHA-384, with normal info",0,{},{}],["Derived key of type name: AES-CTR length: 128 using long derivedKey, empty salt, SHA-384, with normal info with bad hash name SHA384",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-CTR length: 128 using long derivedKey, empty salt, SHA-384, with normal info with missing deriveKey usage",0,{},{}],["Derived key of type name: AES-CTR length: 128 using long derivedKey, empty salt, SHA-384, with normal info with wrong (ECDH) key",0,{},{}],["Derived key of type name: AES-CTR length: 192 using long derivedKey, empty salt, SHA-384, with normal info",0,{},{}],["Derived key of type name: AES-CTR length: 192 using long derivedKey, empty salt, SHA-384, with normal info with bad hash name SHA384",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-CTR length: 192 using long derivedKey, empty salt, SHA-384, with normal info with missing deriveKey usage",0,{},{}],["Derived key of type name: AES-CTR length: 192 using long derivedKey, empty salt, SHA-384, with normal info with wrong (ECDH) key",0,{},{}],["Derived key of type name: AES-CTR length: 256 using long derivedKey, empty salt, SHA-384, with normal info",0,{},{}],["Derived key of type name: AES-CTR length: 256 using long derivedKey, empty salt, SHA-384, with normal info with bad hash name SHA384",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-CTR length: 256 using long derivedKey, empty salt, SHA-384, with normal info with missing deriveKey usage",0,{},{}],["Derived key of type name: AES-CTR length: 256 using long derivedKey, empty salt, SHA-384, with normal info with wrong (ECDH) key",0,{},{}],["Derived key of type name: AES-GCM length: 128 using long derivedKey, empty salt, SHA-384, with normal info",0,{},{}],["Derived key of type name: AES-GCM length: 128 using long derivedKey, empty salt, SHA-384, with normal info with bad hash name SHA384",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-GCM length: 128 using long derivedKey, empty salt, SHA-384, with normal info with missing deriveKey usage",0,{},{}],["Derived key of type name: AES-GCM length: 128 using long derivedKey, empty salt, SHA-384, with normal info with wrong (ECDH) key",0,{},{}],["Derived key of type name: AES-GCM length: 192 using long derivedKey, empty salt, SHA-384, with normal info",0,{},{}],["Derived key of type name: AES-GCM length: 192 using long derivedKey, empty salt, SHA-384, with normal info with bad hash name SHA384",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-GCM length: 192 using long derivedKey, empty salt, SHA-384, with normal info with missing deriveKey usage",0,{},{}],["Derived key of type name: AES-GCM length: 192 using long derivedKey, empty salt, SHA-384, with normal info with wrong (ECDH) key",0,{},{}],["Derived key of type name: AES-GCM length: 256 using long derivedKey, empty salt, SHA-384, with normal info",0,{},{}],["Derived key of type name: AES-GCM length: 256 using long derivedKey, empty salt, SHA-384, with normal info with bad hash name SHA384",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-GCM length: 256 using long derivedKey, empty salt, SHA-384, with normal info with missing deriveKey usage",0,{},{}],["Derived key of type name: AES-GCM length: 256 using long derivedKey, empty salt, SHA-384, with normal info with wrong (ECDH) key",0,{},{}],["Derived key of type name: AES-KW length: 128 using long derivedKey, empty salt, SHA-384, with normal info",0,{},{}],["Derived key of type name: AES-KW length: 128 using long derivedKey, empty salt, SHA-384, with normal info with bad hash name SHA384",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-KW length: 128 using long derivedKey, empty salt, SHA-384, with normal info with missing deriveKey usage",0,{},{}],["Derived key of type name: AES-KW length: 128 using long derivedKey, empty salt, SHA-384, with normal info with wrong (ECDH) key",0,{},{}],["Derived key of type name: AES-KW length: 192 using long derivedKey, empty salt, SHA-384, with normal info",0,{},{}],["Derived key of type name: AES-KW length: 192 using long derivedKey, empty salt, SHA-384, with normal info with bad hash name SHA384",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-KW length: 192 using long derivedKey, empty salt, SHA-384, with normal info with missing deriveKey usage",0,{},{}],["Derived key of type name: AES-KW length: 192 using long derivedKey, empty salt, SHA-384, with normal info with wrong (ECDH) key",0,{},{}],["Derived key of type name: AES-KW length: 256 using long derivedKey, empty salt, SHA-384, with normal info",0,{},{}],["Derived key of type name: AES-KW length: 256 using long derivedKey, empty salt, SHA-384, with normal info with bad hash name SHA384",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-KW length: 256 using long derivedKey, empty salt, SHA-384, with normal info with missing deriveKey usage",0,{},{}],["Derived key of type name: AES-KW length: 256 using long derivedKey, empty salt, SHA-384, with normal info with wrong (ECDH) key",0,{},{}],["Derived key of type name: HMAC hash: SHA-1 length: 256 using long derivedKey, empty salt, SHA-384, with normal info",0,{},{}],["Derived key of type name: HMAC hash: SHA-1 length: 256 using long derivedKey, empty salt, SHA-384, with normal info with bad hash name SHA384",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: HMAC hash: SHA-1 length: 256 using long derivedKey, empty salt, SHA-384, with normal info with missing deriveKey usage",0,{},{}],["Derived key of type name: HMAC hash: SHA-1 length: 256 using long derivedKey, empty salt, SHA-384, with normal info with wrong (ECDH) key",0,{},{}],["Derived key of type name: HMAC hash: SHA-256 length: 256 using long derivedKey, empty salt, SHA-384, with normal info",0,{},{}],["Derived key of type name: HMAC hash: SHA-256 length: 256 using long derivedKey, empty salt, SHA-384, with normal info with bad hash name SHA384",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: HMAC hash: SHA-256 length: 256 using long derivedKey, empty salt, SHA-384, with normal info with missing deriveKey usage",0,{},{}],["Derived key of type name: HMAC hash: SHA-256 length: 256 using long derivedKey, empty salt, SHA-384, with normal info with wrong (ECDH) key",0,{},{}],["Derived key of type name: HMAC hash: SHA-384 length: 256 using long derivedKey, empty salt, SHA-384, with normal info",0,{},{}],["Derived key of type name: HMAC hash: SHA-384 length: 256 using long derivedKey, empty salt, SHA-384, with normal info with bad hash name SHA384",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: HMAC hash: SHA-384 length: 256 using long derivedKey, empty salt, SHA-384, with normal info with missing deriveKey usage",0,{},{}],["Derived key of type name: HMAC hash: SHA-384 length: 256 using long derivedKey, empty salt, SHA-384, with normal info with wrong (ECDH) key",0,{},{}],["Derived key of type name: HMAC hash: SHA-512 length: 256 using long derivedKey, empty salt, SHA-384, with normal info",0,{},{}],["Derived key of type name: HMAC hash: SHA-512 length: 256 using long derivedKey, empty salt, SHA-384, with normal info with bad hash name SHA384",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: HMAC hash: SHA-512 length: 256 using long derivedKey, empty salt, SHA-384, with normal info with missing deriveKey usage",0,{},{}],["Derived key of type name: HMAC hash: SHA-512 length: 256 using long derivedKey, empty salt, SHA-384, with normal info with wrong (ECDH) key",0,{},{}],["long derivedKey, empty salt, SHA-384, with normal info with missing salt",1,"assert_equals: deriveBits missing salt correctly threw OperationError: An invalid or illegal string was specified expected \"TypeError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:128:33\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:124:36\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:123:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["long derivedKey, empty salt, SHA-384, with normal info with missing info",1,"assert_equals: deriveBits missing info correctly threw OperationError: An invalid or illegal string was specified expected \"TypeError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:138:33\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:134:36\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:133:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["long derivedKey, empty salt, SHA-384, with normal info with null length",1,"assert_equals: deriveBits with null length correctly threw OperationError: Data provided to an operation does not meet requirements expected \"TypeError\" but got \"DataError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:148:33\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:144:36\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:143:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["long derivedKey, empty salt, SHA-384, with normal info with non-multiple of 8 length",1,"assert_unreached: non-multiple of 8 length should have thrown an OperationError Reached unreachable code","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:156:33\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:154:36\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:153:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["long derivedKey, empty salt, SHA-384, with normal info with bad hash name SHA384",1,"assert_equals: deriveBits with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:170:33\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:166:36\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:164:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["long derivedKey, empty salt, SHA-384, with normal info with missing deriveBits usage",0,{},{}],["long derivedKey, empty salt, SHA-384, with normal info with wrong (ECDH) key",0,{},{}],["long derivedKey, empty salt, SHA-384, with empty info",0,{},{}],["long derivedKey, empty salt, SHA-384, with empty info with 0 length",1,"assert_equals: deriveBits with 0 length correctly threw OperationError: Data provided to an operation does not meet requirements expected \"OperationError\" but got \"DataError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:54:33\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:50:36\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:49:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-CBC length: 128 using long derivedKey, empty salt, SHA-384, with empty info",0,{},{}],["Derived key of type name: AES-CBC length: 128 using long derivedKey, empty salt, SHA-384, with empty info with bad hash name SHA384",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-CBC length: 128 using long derivedKey, empty salt, SHA-384, with empty info with missing deriveKey usage",0,{},{}],["Derived key of type name: AES-CBC length: 128 using long derivedKey, empty salt, SHA-384, with empty info with wrong (ECDH) key",0,{},{}],["Derived key of type name: AES-CBC length: 192 using long derivedKey, empty salt, SHA-384, with empty info",0,{},{}],["Derived key of type name: AES-CBC length: 192 using long derivedKey, empty salt, SHA-384, with empty info with bad hash name SHA384",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-CBC length: 192 using long derivedKey, empty salt, SHA-384, with empty info with missing deriveKey usage",0,{},{}],["Derived key of type name: AES-CBC length: 192 using long derivedKey, empty salt, SHA-384, with empty info with wrong (ECDH) key",0,{},{}],["Derived key of type name: AES-CBC length: 256 using long derivedKey, empty salt, SHA-384, with empty info",0,{},{}],["Derived key of type name: AES-CBC length: 256 using long derivedKey, empty salt, SHA-384, with empty info with bad hash name SHA384",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-CBC length: 256 using long derivedKey, empty salt, SHA-384, with empty info with missing deriveKey usage",0,{},{}],["Derived key of type name: AES-CBC length: 256 using long derivedKey, empty salt, SHA-384, with empty info with wrong (ECDH) key",0,{},{}],["Derived key of type name: AES-CTR length: 128 using long derivedKey, empty salt, SHA-384, with empty info",0,{},{}],["Derived key of type name: AES-CTR length: 128 using long derivedKey, empty salt, SHA-384, with empty info with bad hash name SHA384",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-CTR length: 128 using long derivedKey, empty salt, SHA-384, with empty info with missing deriveKey usage",0,{},{}],["Derived key of type name: AES-CTR length: 128 using long derivedKey, empty salt, SHA-384, with empty info with wrong (ECDH) key",0,{},{}],["Derived key of type name: AES-CTR length: 192 using long derivedKey, empty salt, SHA-384, with empty info",0,{},{}],["Derived key of type name: AES-CTR length: 192 using long derivedKey, empty salt, SHA-384, with empty info with bad hash name SHA384",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-CTR length: 192 using long derivedKey, empty salt, SHA-384, with empty info with missing deriveKey usage",0,{},{}],["Derived key of type name: AES-CTR length: 192 using long derivedKey, empty salt, SHA-384, with empty info with wrong (ECDH) key",0,{},{}],["Derived key of type name: AES-CTR length: 256 using long derivedKey, empty salt, SHA-384, with empty info",0,{},{}],["Derived key of type name: AES-CTR length: 256 using long derivedKey, empty salt, SHA-384, with empty info with bad hash name SHA384",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-CTR length: 256 using long derivedKey, empty salt, SHA-384, with empty info with missing deriveKey usage",0,{},{}],["Derived key of type name: AES-CTR length: 256 using long derivedKey, empty salt, SHA-384, with empty info with wrong (ECDH) key",0,{},{}],["Derived key of type name: AES-GCM length: 128 using long derivedKey, empty salt, SHA-384, with empty info",0,{},{}],["Derived key of type name: AES-GCM length: 128 using long derivedKey, empty salt, SHA-384, with empty info with bad hash name SHA384",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-GCM length: 128 using long derivedKey, empty salt, SHA-384, with empty info with missing deriveKey usage",0,{},{}],["Derived key of type name: AES-GCM length: 128 using long derivedKey, empty salt, SHA-384, with empty info with wrong (ECDH) key",0,{},{}],["Derived key of type name: AES-GCM length: 192 using long derivedKey, empty salt, SHA-384, with empty info",0,{},{}],["Derived key of type name: AES-GCM length: 192 using long derivedKey, empty salt, SHA-384, with empty info with bad hash name SHA384",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-GCM length: 192 using long derivedKey, empty salt, SHA-384, with empty info with missing deriveKey usage",0,{},{}],["Derived key of type name: AES-GCM length: 192 using long derivedKey, empty salt, SHA-384, with empty info with wrong (ECDH) key",0,{},{}],["Derived key of type name: AES-GCM length: 256 using long derivedKey, empty salt, SHA-384, with empty info",0,{},{}],["Derived key of type name: AES-GCM length: 256 using long derivedKey, empty salt, SHA-384, with empty info with bad hash name SHA384",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-GCM length: 256 using long derivedKey, empty salt, SHA-384, with empty info with missing deriveKey usage",0,{},{}],["Derived key of type name: AES-GCM length: 256 using long derivedKey, empty salt, SHA-384, with empty info with wrong (ECDH) key",0,{},{}],["Derived key of type name: AES-KW length: 128 using long derivedKey, empty salt, SHA-384, with empty info",0,{},{}],["Derived key of type name: AES-KW length: 128 using long derivedKey, empty salt, SHA-384, with empty info with bad hash name SHA384",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-KW length: 128 using long derivedKey, empty salt, SHA-384, with empty info with missing deriveKey usage",0,{},{}],["Derived key of type name: AES-KW length: 128 using long derivedKey, empty salt, SHA-384, with empty info with wrong (ECDH) key",0,{},{}],["Derived key of type name: AES-KW length: 192 using long derivedKey, empty salt, SHA-384, with empty info",0,{},{}],["Derived key of type name: AES-KW length: 192 using long derivedKey, empty salt, SHA-384, with empty info with bad hash name SHA384",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-KW length: 192 using long derivedKey, empty salt, SHA-384, with empty info with missing deriveKey usage",0,{},{}],["Derived key of type name: AES-KW length: 192 using long derivedKey, empty salt, SHA-384, with empty info with wrong (ECDH) key",0,{},{}],["Derived key of type name: AES-KW length: 256 using long derivedKey, empty salt, SHA-384, with empty info",0,{},{}],["Derived key of type name: AES-KW length: 256 using long derivedKey, empty salt, SHA-384, with empty info with bad hash name SHA384",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-KW length: 256 using long derivedKey, empty salt, SHA-384, with empty info with missing deriveKey usage",0,{},{}],["Derived key of type name: AES-KW length: 256 using long derivedKey, empty salt, SHA-384, with empty info with wrong (ECDH) key",0,{},{}],["Derived key of type name: HMAC hash: SHA-1 length: 256 using long derivedKey, empty salt, SHA-384, with empty info",0,{},{}],["Derived key of type name: HMAC hash: SHA-1 length: 256 using long derivedKey, empty salt, SHA-384, with empty info with bad hash name SHA384",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: HMAC hash: SHA-1 length: 256 using long derivedKey, empty salt, SHA-384, with empty info with missing deriveKey usage",0,{},{}],["Derived key of type name: HMAC hash: SHA-1 length: 256 using long derivedKey, empty salt, SHA-384, with empty info with wrong (ECDH) key",0,{},{}],["Derived key of type name: HMAC hash: SHA-256 length: 256 using long derivedKey, empty salt, SHA-384, with empty info",0,{},{}],["Derived key of type name: HMAC hash: SHA-256 length: 256 using long derivedKey, empty salt, SHA-384, with empty info with bad hash name SHA384",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: HMAC hash: SHA-256 length: 256 using long derivedKey, empty salt, SHA-384, with empty info with missing deriveKey usage",0,{},{}],["Derived key of type name: HMAC hash: SHA-256 length: 256 using long derivedKey, empty salt, SHA-384, with empty info with wrong (ECDH) key",0,{},{}],["Derived key of type name: HMAC hash: SHA-384 length: 256 using long derivedKey, empty salt, SHA-384, with empty info",0,{},{}],["Derived key of type name: HMAC hash: SHA-384 length: 256 using long derivedKey, empty salt, SHA-384, with empty info with bad hash name SHA384",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: HMAC hash: SHA-384 length: 256 using long derivedKey, empty salt, SHA-384, with empty info with missing deriveKey usage",0,{},{}],["Derived key of type name: HMAC hash: SHA-384 length: 256 using long derivedKey, empty salt, SHA-384, with empty info with wrong (ECDH) key",0,{},{}],["Derived key of type name: HMAC hash: SHA-512 length: 256 using long derivedKey, empty salt, SHA-384, with empty info",0,{},{}],["Derived key of type name: HMAC hash: SHA-512 length: 256 using long derivedKey, empty salt, SHA-384, with empty info with bad hash name SHA384",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: HMAC hash: SHA-512 length: 256 using long derivedKey, empty salt, SHA-384, with empty info with missing deriveKey usage",0,{},{}],["Derived key of type name: HMAC hash: SHA-512 length: 256 using long derivedKey, empty salt, SHA-384, with empty info with wrong (ECDH) key",0,{},{}],["long derivedKey, empty salt, SHA-384, with empty info with missing salt",1,"assert_equals: deriveBits missing salt correctly threw OperationError: An invalid or illegal string was specified expected \"TypeError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:128:33\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:124:36\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:123:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["long derivedKey, empty salt, SHA-384, with empty info with missing info",1,"assert_equals: deriveBits missing info correctly threw OperationError: An invalid or illegal string was specified expected \"TypeError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:138:33\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:134:36\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:133:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["long derivedKey, empty salt, SHA-384, with empty info with null length",1,"assert_equals: deriveBits with null length correctly threw OperationError: Data provided to an operation does not meet requirements expected \"TypeError\" but got \"DataError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:148:33\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:144:36\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:143:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["long derivedKey, empty salt, SHA-384, with empty info with non-multiple of 8 length",1,"assert_unreached: non-multiple of 8 length should have thrown an OperationError Reached unreachable code","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:156:33\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:154:36\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:153:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["long derivedKey, empty salt, SHA-384, with empty info with bad hash name SHA384",1,"assert_equals: deriveBits with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:170:33\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:166:36\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:164:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["long derivedKey, empty salt, SHA-384, with empty info with missing deriveBits usage",0,{},{}],["long derivedKey, empty salt, SHA-384, with empty info with wrong (ECDH) key",0,{},{}],["long derivedKey, empty salt, SHA-512, with normal info",0,{},{}],["long derivedKey, empty salt, SHA-512, with normal info with 0 length",1,"assert_equals: deriveBits with 0 length correctly threw OperationError: Data provided to an operation does not meet requirements expected \"OperationError\" but got \"DataError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:54:33\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:50:36\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:49:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-CBC length: 128 using long derivedKey, empty salt, SHA-512, with normal info",0,{},{}],["Derived key of type name: AES-CBC length: 128 using long derivedKey, empty salt, SHA-512, with normal info with bad hash name SHA512",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-CBC length: 128 using long derivedKey, empty salt, SHA-512, with normal info with missing deriveKey usage",0,{},{}],["Derived key of type name: AES-CBC length: 128 using long derivedKey, empty salt, SHA-512, with normal info with wrong (ECDH) key",0,{},{}],["Derived key of type name: AES-CBC length: 192 using long derivedKey, empty salt, SHA-512, with normal info",0,{},{}],["Derived key of type name: AES-CBC length: 192 using long derivedKey, empty salt, SHA-512, with normal info with bad hash name SHA512",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-CBC length: 192 using long derivedKey, empty salt, SHA-512, with normal info with missing deriveKey usage",0,{},{}],["Derived key of type name: AES-CBC length: 192 using long derivedKey, empty salt, SHA-512, with normal info with wrong (ECDH) key",0,{},{}],["Derived key of type name: AES-CBC length: 256 using long derivedKey, empty salt, SHA-512, with normal info",0,{},{}],["Derived key of type name: AES-CBC length: 256 using long derivedKey, empty salt, SHA-512, with normal info with bad hash name SHA512",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-CBC length: 256 using long derivedKey, empty salt, SHA-512, with normal info with missing deriveKey usage",0,{},{}],["Derived key of type name: AES-CBC length: 256 using long derivedKey, empty salt, SHA-512, with normal info with wrong (ECDH) key",0,{},{}],["Derived key of type name: AES-CTR length: 128 using long derivedKey, empty salt, SHA-512, with normal info",0,{},{}],["Derived key of type name: AES-CTR length: 128 using long derivedKey, empty salt, SHA-512, with normal info with bad hash name SHA512",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-CTR length: 128 using long derivedKey, empty salt, SHA-512, with normal info with missing deriveKey usage",0,{},{}],["Derived key of type name: AES-CTR length: 128 using long derivedKey, empty salt, SHA-512, with normal info with wrong (ECDH) key",0,{},{}],["Derived key of type name: AES-CTR length: 192 using long derivedKey, empty salt, SHA-512, with normal info",0,{},{}],["Derived key of type name: AES-CTR length: 192 using long derivedKey, empty salt, SHA-512, with normal info with bad hash name SHA512",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-CTR length: 192 using long derivedKey, empty salt, SHA-512, with normal info with missing deriveKey usage",0,{},{}],["Derived key of type name: AES-CTR length: 192 using long derivedKey, empty salt, SHA-512, with normal info with wrong (ECDH) key",0,{},{}],["Derived key of type name: AES-CTR length: 256 using long derivedKey, empty salt, SHA-512, with normal info",0,{},{}],["Derived key of type name: AES-CTR length: 256 using long derivedKey, empty salt, SHA-512, with normal info with bad hash name SHA512",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-CTR length: 256 using long derivedKey, empty salt, SHA-512, with normal info with missing deriveKey usage",0,{},{}],["Derived key of type name: AES-CTR length: 256 using long derivedKey, empty salt, SHA-512, with normal info with wrong (ECDH) key",0,{},{}],["Derived key of type name: AES-GCM length: 128 using long derivedKey, empty salt, SHA-512, with normal info",0,{},{}],["Derived key of type name: AES-GCM length: 128 using long derivedKey, empty salt, SHA-512, with normal info with bad hash name SHA512",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-GCM length: 128 using long derivedKey, empty salt, SHA-512, with normal info with missing deriveKey usage",0,{},{}],["Derived key of type name: AES-GCM length: 128 using long derivedKey, empty salt, SHA-512, with normal info with wrong (ECDH) key",0,{},{}],["Derived key of type name: AES-GCM length: 192 using long derivedKey, empty salt, SHA-512, with normal info",0,{},{}],["Derived key of type name: AES-GCM length: 192 using long derivedKey, empty salt, SHA-512, with normal info with bad hash name SHA512",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-GCM length: 192 using long derivedKey, empty salt, SHA-512, with normal info with missing deriveKey usage",0,{},{}],["Derived key of type name: AES-GCM length: 192 using long derivedKey, empty salt, SHA-512, with normal info with wrong (ECDH) key",0,{},{}],["Derived key of type name: AES-GCM length: 256 using long derivedKey, empty salt, SHA-512, with normal info",0,{},{}],["Derived key of type name: AES-GCM length: 256 using long derivedKey, empty salt, SHA-512, with normal info with bad hash name SHA512",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-GCM length: 256 using long derivedKey, empty salt, SHA-512, with normal info with missing deriveKey usage",0,{},{}],["Derived key of type name: AES-GCM length: 256 using long derivedKey, empty salt, SHA-512, with normal info with wrong (ECDH) key",0,{},{}],["Derived key of type name: AES-KW length: 128 using long derivedKey, empty salt, SHA-512, with normal info",0,{},{}],["Derived key of type name: AES-KW length: 128 using long derivedKey, empty salt, SHA-512, with normal info with bad hash name SHA512",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-KW length: 128 using long derivedKey, empty salt, SHA-512, with normal info with missing deriveKey usage",0,{},{}],["Derived key of type name: AES-KW length: 128 using long derivedKey, empty salt, SHA-512, with normal info with wrong (ECDH) key",0,{},{}],["Derived key of type name: AES-KW length: 192 using long derivedKey, empty salt, SHA-512, with normal info",0,{},{}],["Derived key of type name: AES-KW length: 192 using long derivedKey, empty salt, SHA-512, with normal info with bad hash name SHA512",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-KW length: 192 using long derivedKey, empty salt, SHA-512, with normal info with missing deriveKey usage",0,{},{}],["Derived key of type name: AES-KW length: 192 using long derivedKey, empty salt, SHA-512, with normal info with wrong (ECDH) key",0,{},{}],["Derived key of type name: AES-KW length: 256 using long derivedKey, empty salt, SHA-512, with normal info",0,{},{}],["Derived key of type name: AES-KW length: 256 using long derivedKey, empty salt, SHA-512, with normal info with bad hash name SHA512",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-KW length: 256 using long derivedKey, empty salt, SHA-512, with normal info with missing deriveKey usage",0,{},{}],["Derived key of type name: AES-KW length: 256 using long derivedKey, empty salt, SHA-512, with normal info with wrong (ECDH) key",0,{},{}],["Derived key of type name: HMAC hash: SHA-1 length: 256 using long derivedKey, empty salt, SHA-512, with normal info",0,{},{}],["Derived key of type name: HMAC hash: SHA-1 length: 256 using long derivedKey, empty salt, SHA-512, with normal info with bad hash name SHA512",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: HMAC hash: SHA-1 length: 256 using long derivedKey, empty salt, SHA-512, with normal info with missing deriveKey usage",0,{},{}],["Derived key of type name: HMAC hash: SHA-1 length: 256 using long derivedKey, empty salt, SHA-512, with normal info with wrong (ECDH) key",0,{},{}],["Derived key of type name: HMAC hash: SHA-256 length: 256 using long derivedKey, empty salt, SHA-512, with normal info",0,{},{}],["Derived key of type name: HMAC hash: SHA-256 length: 256 using long derivedKey, empty salt, SHA-512, with normal info with bad hash name SHA512",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: HMAC hash: SHA-256 length: 256 using long derivedKey, empty salt, SHA-512, with normal info with missing deriveKey usage",0,{},{}],["Derived key of type name: HMAC hash: SHA-256 length: 256 using long derivedKey, empty salt, SHA-512, with normal info with wrong (ECDH) key",0,{},{}],["Derived key of type name: HMAC hash: SHA-384 length: 256 using long derivedKey, empty salt, SHA-512, with normal info",0,{},{}],["Derived key of type name: HMAC hash: SHA-384 length: 256 using long derivedKey, empty salt, SHA-512, with normal info with bad hash name SHA512",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: HMAC hash: SHA-384 length: 256 using long derivedKey, empty salt, SHA-512, with normal info with missing deriveKey usage",0,{},{}],["Derived key of type name: HMAC hash: SHA-384 length: 256 using long derivedKey, empty salt, SHA-512, with normal info with wrong (ECDH) key",0,{},{}],["Derived key of type name: HMAC hash: SHA-512 length: 256 using long derivedKey, empty salt, SHA-512, with normal info",0,{},{}],["Derived key of type name: HMAC hash: SHA-512 length: 256 using long derivedKey, empty salt, SHA-512, with normal info with bad hash name SHA512",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: HMAC hash: SHA-512 length: 256 using long derivedKey, empty salt, SHA-512, with normal info with missing deriveKey usage",0,{},{}],["Derived key of type name: HMAC hash: SHA-512 length: 256 using long derivedKey, empty salt, SHA-512, with normal info with wrong (ECDH) key",0,{},{}],["long derivedKey, empty salt, SHA-512, with normal info with missing salt",1,"assert_equals: deriveBits missing salt correctly threw OperationError: An invalid or illegal string was specified expected \"TypeError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:128:33\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:124:36\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:123:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["long derivedKey, empty salt, SHA-512, with normal info with missing info",1,"assert_equals: deriveBits missing info correctly threw OperationError: An invalid or illegal string was specified expected \"TypeError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:138:33\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:134:36\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:133:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["long derivedKey, empty salt, SHA-512, with normal info with null length",1,"assert_equals: deriveBits with null length correctly threw OperationError: Data provided to an operation does not meet requirements expected \"TypeError\" but got \"DataError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:148:33\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:144:36\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:143:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["long derivedKey, empty salt, SHA-512, with normal info with non-multiple of 8 length",1,"assert_unreached: non-multiple of 8 length should have thrown an OperationError Reached unreachable code","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:156:33\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:154:36\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:153:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["long derivedKey, empty salt, SHA-512, with normal info with bad hash name SHA512",1,"assert_equals: deriveBits with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:170:33\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:166:36\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:164:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["long derivedKey, empty salt, SHA-512, with normal info with missing deriveBits usage",0,{},{}],["long derivedKey, empty salt, SHA-512, with normal info with wrong (ECDH) key",0,{},{}],["long derivedKey, empty salt, SHA-512, with empty info",0,{},{}],["long derivedKey, empty salt, SHA-512, with empty info with 0 length",1,"assert_equals: deriveBits with 0 length correctly threw OperationError: Data provided to an operation does not meet requirements expected \"OperationError\" but got \"DataError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:54:33\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:50:36\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:49:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-CBC length: 128 using long derivedKey, empty salt, SHA-512, with empty info",0,{},{}],["Derived key of type name: AES-CBC length: 128 using long derivedKey, empty salt, SHA-512, with empty info with bad hash name SHA512",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-CBC length: 128 using long derivedKey, empty salt, SHA-512, with empty info with missing deriveKey usage",0,{},{}],["Derived key of type name: AES-CBC length: 128 using long derivedKey, empty salt, SHA-512, with empty info with wrong (ECDH) key",0,{},{}],["Derived key of type name: AES-CBC length: 192 using long derivedKey, empty salt, SHA-512, with empty info",0,{},{}],["Derived key of type name: AES-CBC length: 192 using long derivedKey, empty salt, SHA-512, with empty info with bad hash name SHA512",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-CBC length: 192 using long derivedKey, empty salt, SHA-512, with empty info with missing deriveKey usage",0,{},{}],["Derived key of type name: AES-CBC length: 192 using long derivedKey, empty salt, SHA-512, with empty info with wrong (ECDH) key",0,{},{}],["Derived key of type name: AES-CBC length: 256 using long derivedKey, empty salt, SHA-512, with empty info",0,{},{}],["Derived key of type name: AES-CBC length: 256 using long derivedKey, empty salt, SHA-512, with empty info with bad hash name SHA512",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-CBC length: 256 using long derivedKey, empty salt, SHA-512, with empty info with missing deriveKey usage",0,{},{}],["Derived key of type name: AES-CBC length: 256 using long derivedKey, empty salt, SHA-512, with empty info with wrong (ECDH) key",0,{},{}],["Derived key of type name: AES-CTR length: 128 using long derivedKey, empty salt, SHA-512, with empty info",0,{},{}],["Derived key of type name: AES-CTR length: 128 using long derivedKey, empty salt, SHA-512, with empty info with bad hash name SHA512",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-CTR length: 128 using long derivedKey, empty salt, SHA-512, with empty info with missing deriveKey usage",0,{},{}],["Derived key of type name: AES-CTR length: 128 using long derivedKey, empty salt, SHA-512, with empty info with wrong (ECDH) key",0,{},{}],["Derived key of type name: AES-CTR length: 192 using long derivedKey, empty salt, SHA-512, with empty info",0,{},{}],["Derived key of type name: AES-CTR length: 192 using long derivedKey, empty salt, SHA-512, with empty info with bad hash name SHA512",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-CTR length: 192 using long derivedKey, empty salt, SHA-512, with empty info with missing deriveKey usage",0,{},{}],["Derived key of type name: AES-CTR length: 192 using long derivedKey, empty salt, SHA-512, with empty info with wrong (ECDH) key",0,{},{}],["Derived key of type name: AES-CTR length: 256 using long derivedKey, empty salt, SHA-512, with empty info",0,{},{}],["Derived key of type name: AES-CTR length: 256 using long derivedKey, empty salt, SHA-512, with empty info with bad hash name SHA512",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-CTR length: 256 using long derivedKey, empty salt, SHA-512, with empty info with missing deriveKey usage",0,{},{}],["Derived key of type name: AES-CTR length: 256 using long derivedKey, empty salt, SHA-512, with empty info with wrong (ECDH) key",0,{},{}],["Derived key of type name: AES-GCM length: 128 using long derivedKey, empty salt, SHA-512, with empty info",0,{},{}],["Derived key of type name: AES-GCM length: 128 using long derivedKey, empty salt, SHA-512, with empty info with bad hash name SHA512",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-GCM length: 128 using long derivedKey, empty salt, SHA-512, with empty info with missing deriveKey usage",0,{},{}],["Derived key of type name: AES-GCM length: 128 using long derivedKey, empty salt, SHA-512, with empty info with wrong (ECDH) key",0,{},{}],["Derived key of type name: AES-GCM length: 192 using long derivedKey, empty salt, SHA-512, with empty info",0,{},{}],["Derived key of type name: AES-GCM length: 192 using long derivedKey, empty salt, SHA-512, with empty info with bad hash name SHA512",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-GCM length: 192 using long derivedKey, empty salt, SHA-512, with empty info with missing deriveKey usage",0,{},{}],["Derived key of type name: AES-GCM length: 192 using long derivedKey, empty salt, SHA-512, with empty info with wrong (ECDH) key",0,{},{}],["Derived key of type name: AES-GCM length: 256 using long derivedKey, empty salt, SHA-512, with empty info",0,{},{}],["Derived key of type name: AES-GCM length: 256 using long derivedKey, empty salt, SHA-512, with empty info with bad hash name SHA512",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-GCM length: 256 using long derivedKey, empty salt, SHA-512, with empty info with missing deriveKey usage",0,{},{}],["Derived key of type name: AES-GCM length: 256 using long derivedKey, empty salt, SHA-512, with empty info with wrong (ECDH) key",0,{},{}],["Derived key of type name: AES-KW length: 128 using long derivedKey, empty salt, SHA-512, with empty info",0,{},{}],["Derived key of type name: AES-KW length: 128 using long derivedKey, empty salt, SHA-512, with empty info with bad hash name SHA512",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-KW length: 128 using long derivedKey, empty salt, SHA-512, with empty info with missing deriveKey usage",0,{},{}],["Derived key of type name: AES-KW length: 128 using long derivedKey, empty salt, SHA-512, with empty info with wrong (ECDH) key",0,{},{}],["Derived key of type name: AES-KW length: 192 using long derivedKey, empty salt, SHA-512, with empty info",0,{},{}],["Derived key of type name: AES-KW length: 192 using long derivedKey, empty salt, SHA-512, with empty info with bad hash name SHA512",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-KW length: 192 using long derivedKey, empty salt, SHA-512, with empty info with missing deriveKey usage",0,{},{}],["Derived key of type name: AES-KW length: 192 using long derivedKey, empty salt, SHA-512, with empty info with wrong (ECDH) key",0,{},{}],["Derived key of type name: AES-KW length: 256 using long derivedKey, empty salt, SHA-512, with empty info",0,{},{}],["Derived key of type name: AES-KW length: 256 using long derivedKey, empty salt, SHA-512, with empty info with bad hash name SHA512",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-KW length: 256 using long derivedKey, empty salt, SHA-512, with empty info with missing deriveKey usage",0,{},{}],["Derived key of type name: AES-KW length: 256 using long derivedKey, empty salt, SHA-512, with empty info with wrong (ECDH) key",0,{},{}],["Derived key of type name: HMAC hash: SHA-1 length: 256 using long derivedKey, empty salt, SHA-512, with empty info",0,{},{}],["Derived key of type name: HMAC hash: SHA-1 length: 256 using long derivedKey, empty salt, SHA-512, with empty info with bad hash name SHA512",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: HMAC hash: SHA-1 length: 256 using long derivedKey, empty salt, SHA-512, with empty info with missing deriveKey usage",0,{},{}],["Derived key of type name: HMAC hash: SHA-1 length: 256 using long derivedKey, empty salt, SHA-512, with empty info with wrong (ECDH) key",0,{},{}],["Derived key of type name: HMAC hash: SHA-256 length: 256 using long derivedKey, empty salt, SHA-512, with empty info",0,{},{}],["Derived key of type name: HMAC hash: SHA-256 length: 256 using long derivedKey, empty salt, SHA-512, with empty info with bad hash name SHA512",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: HMAC hash: SHA-256 length: 256 using long derivedKey, empty salt, SHA-512, with empty info with missing deriveKey usage",0,{},{}],["Derived key of type name: HMAC hash: SHA-256 length: 256 using long derivedKey, empty salt, SHA-512, with empty info with wrong (ECDH) key",0,{},{}],["Derived key of type name: HMAC hash: SHA-384 length: 256 using long derivedKey, empty salt, SHA-512, with empty info",0,{},{}],["Derived key of type name: HMAC hash: SHA-384 length: 256 using long derivedKey, empty salt, SHA-512, with empty info with bad hash name SHA512",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: HMAC hash: SHA-384 length: 256 using long derivedKey, empty salt, SHA-512, with empty info with missing deriveKey usage",0,{},{}],["Derived key of type name: HMAC hash: SHA-384 length: 256 using long derivedKey, empty salt, SHA-512, with empty info with wrong (ECDH) key",0,{},{}],["Derived key of type name: HMAC hash: SHA-512 length: 256 using long derivedKey, empty salt, SHA-512, with empty info",0,{},{}],["Derived key of type name: HMAC hash: SHA-512 length: 256 using long derivedKey, empty salt, SHA-512, with empty info with bad hash name SHA512",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: HMAC hash: SHA-512 length: 256 using long derivedKey, empty salt, SHA-512, with empty info with missing deriveKey usage",0,{},{}],["Derived key of type name: HMAC hash: SHA-512 length: 256 using long derivedKey, empty salt, SHA-512, with empty info with wrong (ECDH) key",0,{},{}],["long derivedKey, empty salt, SHA-512, with empty info with missing salt",1,"assert_equals: deriveBits missing salt correctly threw OperationError: An invalid or illegal string was specified expected \"TypeError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:128:33\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:124:36\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:123:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["long derivedKey, empty salt, SHA-512, with empty info with missing info",1,"assert_equals: deriveBits missing info correctly threw OperationError: An invalid or illegal string was specified expected \"TypeError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:138:33\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:134:36\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:133:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["long derivedKey, empty salt, SHA-512, with empty info with null length",1,"assert_equals: deriveBits with null length correctly threw OperationError: Data provided to an operation does not meet requirements expected \"TypeError\" but got \"DataError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:148:33\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:144:36\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:143:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["long derivedKey, empty salt, SHA-512, with empty info with non-multiple of 8 length",1,"assert_unreached: non-multiple of 8 length should have thrown an OperationError Reached unreachable code","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:156:33\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:154:36\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:153:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["long derivedKey, empty salt, SHA-512, with empty info with bad hash name SHA512",1,"assert_equals: deriveBits with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:170:33\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:166:36\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:164:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["long derivedKey, empty salt, SHA-512, with empty info with missing deriveBits usage",0,{},{}],["long derivedKey, empty salt, SHA-512, with empty info with wrong (ECDH) key",0,{},{}],["long derivedKey, empty salt, SHA-1, with normal info",0,{},{}],["long derivedKey, empty salt, SHA-1, with normal info with 0 length",1,"assert_equals: deriveBits with 0 length correctly threw OperationError: Data provided to an operation does not meet requirements expected \"OperationError\" but got \"DataError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:54:33\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:50:36\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:49:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-CBC length: 128 using long derivedKey, empty salt, SHA-1, with normal info",0,{},{}],["Derived key of type name: AES-CBC length: 128 using long derivedKey, empty salt, SHA-1, with normal info with bad hash name SHA1",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-CBC length: 128 using long derivedKey, empty salt, SHA-1, with normal info with missing deriveKey usage",0,{},{}],["Derived key of type name: AES-CBC length: 128 using long derivedKey, empty salt, SHA-1, with normal info with wrong (ECDH) key",0,{},{}],["Derived key of type name: AES-CBC length: 192 using long derivedKey, empty salt, SHA-1, with normal info",0,{},{}],["Derived key of type name: AES-CBC length: 192 using long derivedKey, empty salt, SHA-1, with normal info with bad hash name SHA1",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-CBC length: 192 using long derivedKey, empty salt, SHA-1, with normal info with missing deriveKey usage",0,{},{}],["Derived key of type name: AES-CBC length: 192 using long derivedKey, empty salt, SHA-1, with normal info with wrong (ECDH) key",0,{},{}],["Derived key of type name: AES-CBC length: 256 using long derivedKey, empty salt, SHA-1, with normal info",0,{},{}],["Derived key of type name: AES-CBC length: 256 using long derivedKey, empty salt, SHA-1, with normal info with bad hash name SHA1",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-CBC length: 256 using long derivedKey, empty salt, SHA-1, with normal info with missing deriveKey usage",0,{},{}],["Derived key of type name: AES-CBC length: 256 using long derivedKey, empty salt, SHA-1, with normal info with wrong (ECDH) key",0,{},{}],["Derived key of type name: AES-CTR length: 128 using long derivedKey, empty salt, SHA-1, with normal info",0,{},{}],["Derived key of type name: AES-CTR length: 128 using long derivedKey, empty salt, SHA-1, with normal info with bad hash name SHA1",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-CTR length: 128 using long derivedKey, empty salt, SHA-1, with normal info with missing deriveKey usage",0,{},{}],["Derived key of type name: AES-CTR length: 128 using long derivedKey, empty salt, SHA-1, with normal info with wrong (ECDH) key",0,{},{}],["Derived key of type name: AES-CTR length: 192 using long derivedKey, empty salt, SHA-1, with normal info",0,{},{}],["Derived key of type name: AES-CTR length: 192 using long derivedKey, empty salt, SHA-1, with normal info with bad hash name SHA1",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-CTR length: 192 using long derivedKey, empty salt, SHA-1, with normal info with missing deriveKey usage",0,{},{}],["Derived key of type name: AES-CTR length: 192 using long derivedKey, empty salt, SHA-1, with normal info with wrong (ECDH) key",0,{},{}],["Derived key of type name: AES-CTR length: 256 using long derivedKey, empty salt, SHA-1, with normal info",0,{},{}],["Derived key of type name: AES-CTR length: 256 using long derivedKey, empty salt, SHA-1, with normal info with bad hash name SHA1",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-CTR length: 256 using long derivedKey, empty salt, SHA-1, with normal info with missing deriveKey usage",0,{},{}],["Derived key of type name: AES-CTR length: 256 using long derivedKey, empty salt, SHA-1, with normal info with wrong (ECDH) key",0,{},{}],["Derived key of type name: AES-GCM length: 128 using long derivedKey, empty salt, SHA-1, with normal info",0,{},{}],["Derived key of type name: AES-GCM length: 128 using long derivedKey, empty salt, SHA-1, with normal info with bad hash name SHA1",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-GCM length: 128 using long derivedKey, empty salt, SHA-1, with normal info with missing deriveKey usage",0,{},{}],["Derived key of type name: AES-GCM length: 128 using long derivedKey, empty salt, SHA-1, with normal info with wrong (ECDH) key",0,{},{}],["Derived key of type name: AES-GCM length: 192 using long derivedKey, empty salt, SHA-1, with normal info",0,{},{}],["Derived key of type name: AES-GCM length: 192 using long derivedKey, empty salt, SHA-1, with normal info with bad hash name SHA1",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-GCM length: 192 using long derivedKey, empty salt, SHA-1, with normal info with missing deriveKey usage",0,{},{}],["Derived key of type name: AES-GCM length: 192 using long derivedKey, empty salt, SHA-1, with normal info with wrong (ECDH) key",0,{},{}],["Derived key of type name: AES-GCM length: 256 using long derivedKey, empty salt, SHA-1, with normal info",0,{},{}],["Derived key of type name: AES-GCM length: 256 using long derivedKey, empty salt, SHA-1, with normal info with bad hash name SHA1",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-GCM length: 256 using long derivedKey, empty salt, SHA-1, with normal info with missing deriveKey usage",0,{},{}],["Derived key of type name: AES-GCM length: 256 using long derivedKey, empty salt, SHA-1, with normal info with wrong (ECDH) key",0,{},{}],["Derived key of type name: AES-KW length: 128 using long derivedKey, empty salt, SHA-1, with normal info",0,{},{}],["Derived key of type name: AES-KW length: 128 using long derivedKey, empty salt, SHA-1, with normal info with bad hash name SHA1",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-KW length: 128 using long derivedKey, empty salt, SHA-1, with normal info with missing deriveKey usage",0,{},{}],["Derived key of type name: AES-KW length: 128 using long derivedKey, empty salt, SHA-1, with normal info with wrong (ECDH) key",0,{},{}],["Derived key of type name: AES-KW length: 192 using long derivedKey, empty salt, SHA-1, with normal info",0,{},{}],["Derived key of type name: AES-KW length: 192 using long derivedKey, empty salt, SHA-1, with normal info with bad hash name SHA1",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-KW length: 192 using long derivedKey, empty salt, SHA-1, with normal info with missing deriveKey usage",0,{},{}],["Derived key of type name: AES-KW length: 192 using long derivedKey, empty salt, SHA-1, with normal info with wrong (ECDH) key",0,{},{}],["Derived key of type name: AES-KW length: 256 using long derivedKey, empty salt, SHA-1, with normal info",0,{},{}],["Derived key of type name: AES-KW length: 256 using long derivedKey, empty salt, SHA-1, with normal info with bad hash name SHA1",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-KW length: 256 using long derivedKey, empty salt, SHA-1, with normal info with missing deriveKey usage",0,{},{}],["Derived key of type name: AES-KW length: 256 using long derivedKey, empty salt, SHA-1, with normal info with wrong (ECDH) key",0,{},{}],["Derived key of type name: HMAC hash: SHA-1 length: 256 using long derivedKey, empty salt, SHA-1, with normal info",0,{},{}],["Derived key of type name: HMAC hash: SHA-1 length: 256 using long derivedKey, empty salt, SHA-1, with normal info with bad hash name SHA1",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: HMAC hash: SHA-1 length: 256 using long derivedKey, empty salt, SHA-1, with normal info with missing deriveKey usage",0,{},{}],["Derived key of type name: HMAC hash: SHA-1 length: 256 using long derivedKey, empty salt, SHA-1, with normal info with wrong (ECDH) key",0,{},{}],["Derived key of type name: HMAC hash: SHA-256 length: 256 using long derivedKey, empty salt, SHA-1, with normal info",0,{},{}],["Derived key of type name: HMAC hash: SHA-256 length: 256 using long derivedKey, empty salt, SHA-1, with normal info with bad hash name SHA1",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: HMAC hash: SHA-256 length: 256 using long derivedKey, empty salt, SHA-1, with normal info with missing deriveKey usage",0,{},{}],["Derived key of type name: HMAC hash: SHA-256 length: 256 using long derivedKey, empty salt, SHA-1, with normal info with wrong (ECDH) key",0,{},{}],["Derived key of type name: HMAC hash: SHA-384 length: 256 using long derivedKey, empty salt, SHA-1, with normal info",0,{},{}],["Derived key of type name: HMAC hash: SHA-384 length: 256 using long derivedKey, empty salt, SHA-1, with normal info with bad hash name SHA1",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: HMAC hash: SHA-384 length: 256 using long derivedKey, empty salt, SHA-1, with normal info with missing deriveKey usage",0,{},{}],["Derived key of type name: HMAC hash: SHA-384 length: 256 using long derivedKey, empty salt, SHA-1, with normal info with wrong (ECDH) key",0,{},{}],["Derived key of type name: HMAC hash: SHA-512 length: 256 using long derivedKey, empty salt, SHA-1, with normal info",0,{},{}],["Derived key of type name: HMAC hash: SHA-512 length: 256 using long derivedKey, empty salt, SHA-1, with normal info with bad hash name SHA1",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: HMAC hash: SHA-512 length: 256 using long derivedKey, empty salt, SHA-1, with normal info with missing deriveKey usage",0,{},{}],["Derived key of type name: HMAC hash: SHA-512 length: 256 using long derivedKey, empty salt, SHA-1, with normal info with wrong (ECDH) key",0,{},{}],["long derivedKey, empty salt, SHA-1, with normal info with missing salt",1,"assert_equals: deriveBits missing salt correctly threw OperationError: An invalid or illegal string was specified expected \"TypeError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:128:33\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:124:36\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:123:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["long derivedKey, empty salt, SHA-1, with normal info with missing info",1,"assert_equals: deriveBits missing info correctly threw OperationError: An invalid or illegal string was specified expected \"TypeError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:138:33\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:134:36\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:133:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["long derivedKey, empty salt, SHA-1, with normal info with null length",1,"assert_equals: deriveBits with null length correctly threw OperationError: Data provided to an operation does not meet requirements expected \"TypeError\" but got \"DataError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:148:33\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:144:36\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:143:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["long derivedKey, empty salt, SHA-1, with normal info with non-multiple of 8 length",1,"assert_unreached: non-multiple of 8 length should have thrown an OperationError Reached unreachable code","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:156:33\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:154:36\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:153:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["long derivedKey, empty salt, SHA-1, with normal info with bad hash name SHA1",1,"assert_equals: deriveBits with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:170:33\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:166:36\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:164:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["long derivedKey, empty salt, SHA-1, with normal info with missing deriveBits usage",0,{},{}],["long derivedKey, empty salt, SHA-1, with normal info with wrong (ECDH) key",0,{},{}],["long derivedKey, empty salt, SHA-1, with empty info",0,{},{}],["long derivedKey, empty salt, SHA-1, with empty info with 0 length",1,"assert_equals: deriveBits with 0 length correctly threw OperationError: Data provided to an operation does not meet requirements expected \"OperationError\" but got \"DataError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:54:33\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:50:36\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:49:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-CBC length: 128 using long derivedKey, empty salt, SHA-1, with empty info",0,{},{}],["Derived key of type name: AES-CBC length: 128 using long derivedKey, empty salt, SHA-1, with empty info with bad hash name SHA1",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-CBC length: 128 using long derivedKey, empty salt, SHA-1, with empty info with missing deriveKey usage",0,{},{}],["Derived key of type name: AES-CBC length: 128 using long derivedKey, empty salt, SHA-1, with empty info with wrong (ECDH) key",0,{},{}],["Derived key of type name: AES-CBC length: 192 using long derivedKey, empty salt, SHA-1, with empty info",0,{},{}],["Derived key of type name: AES-CBC length: 192 using long derivedKey, empty salt, SHA-1, with empty info with bad hash name SHA1",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-CBC length: 192 using long derivedKey, empty salt, SHA-1, with empty info with missing deriveKey usage",0,{},{}],["Derived key of type name: AES-CBC length: 192 using long derivedKey, empty salt, SHA-1, with empty info with wrong (ECDH) key",0,{},{}],["Derived key of type name: AES-CBC length: 256 using long derivedKey, empty salt, SHA-1, with empty info",0,{},{}],["Derived key of type name: AES-CBC length: 256 using long derivedKey, empty salt, SHA-1, with empty info with bad hash name SHA1",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-CBC length: 256 using long derivedKey, empty salt, SHA-1, with empty info with missing deriveKey usage",0,{},{}],["Derived key of type name: AES-CBC length: 256 using long derivedKey, empty salt, SHA-1, with empty info with wrong (ECDH) key",0,{},{}],["Derived key of type name: AES-CTR length: 128 using long derivedKey, empty salt, SHA-1, with empty info",0,{},{}],["Derived key of type name: AES-CTR length: 128 using long derivedKey, empty salt, SHA-1, with empty info with bad hash name SHA1",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-CTR length: 128 using long derivedKey, empty salt, SHA-1, with empty info with missing deriveKey usage",0,{},{}],["Derived key of type name: AES-CTR length: 128 using long derivedKey, empty salt, SHA-1, with empty info with wrong (ECDH) key",0,{},{}],["Derived key of type name: AES-CTR length: 192 using long derivedKey, empty salt, SHA-1, with empty info",0,{},{}],["Derived key of type name: AES-CTR length: 192 using long derivedKey, empty salt, SHA-1, with empty info with bad hash name SHA1",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-CTR length: 192 using long derivedKey, empty salt, SHA-1, with empty info with missing deriveKey usage",0,{},{}],["Derived key of type name: AES-CTR length: 192 using long derivedKey, empty salt, SHA-1, with empty info with wrong (ECDH) key",0,{},{}],["Derived key of type name: AES-CTR length: 256 using long derivedKey, empty salt, SHA-1, with empty info",0,{},{}],["Derived key of type name: AES-CTR length: 256 using long derivedKey, empty salt, SHA-1, with empty info with bad hash name SHA1",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-CTR length: 256 using long derivedKey, empty salt, SHA-1, with empty info with missing deriveKey usage",0,{},{}],["Derived key of type name: AES-CTR length: 256 using long derivedKey, empty salt, SHA-1, with empty info with wrong (ECDH) key",0,{},{}],["Derived key of type name: AES-GCM length: 128 using long derivedKey, empty salt, SHA-1, with empty info",0,{},{}],["Derived key of type name: AES-GCM length: 128 using long derivedKey, empty salt, SHA-1, with empty info with bad hash name SHA1",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-GCM length: 128 using long derivedKey, empty salt, SHA-1, with empty info with missing deriveKey usage",0,{},{}],["Derived key of type name: AES-GCM length: 128 using long derivedKey, empty salt, SHA-1, with empty info with wrong (ECDH) key",0,{},{}],["Derived key of type name: AES-GCM length: 192 using long derivedKey, empty salt, SHA-1, with empty info",0,{},{}],["Derived key of type name: AES-GCM length: 192 using long derivedKey, empty salt, SHA-1, with empty info with bad hash name SHA1",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-GCM length: 192 using long derivedKey, empty salt, SHA-1, with empty info with missing deriveKey usage",0,{},{}],["Derived key of type name: AES-GCM length: 192 using long derivedKey, empty salt, SHA-1, with empty info with wrong (ECDH) key",0,{},{}],["Derived key of type name: AES-GCM length: 256 using long derivedKey, empty salt, SHA-1, with empty info",0,{},{}],["Derived key of type name: AES-GCM length: 256 using long derivedKey, empty salt, SHA-1, with empty info with bad hash name SHA1",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-GCM length: 256 using long derivedKey, empty salt, SHA-1, with empty info with missing deriveKey usage",0,{},{}],["Derived key of type name: AES-GCM length: 256 using long derivedKey, empty salt, SHA-1, with empty info with wrong (ECDH) key",0,{},{}],["Derived key of type name: AES-KW length: 128 using long derivedKey, empty salt, SHA-1, with empty info",0,{},{}],["Derived key of type name: AES-KW length: 128 using long derivedKey, empty salt, SHA-1, with empty info with bad hash name SHA1",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-KW length: 128 using long derivedKey, empty salt, SHA-1, with empty info with missing deriveKey usage",0,{},{}],["Derived key of type name: AES-KW length: 128 using long derivedKey, empty salt, SHA-1, with empty info with wrong (ECDH) key",0,{},{}],["Derived key of type name: AES-KW length: 192 using long derivedKey, empty salt, SHA-1, with empty info",0,{},{}],["Derived key of type name: AES-KW length: 192 using long derivedKey, empty salt, SHA-1, with empty info with bad hash name SHA1",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-KW length: 192 using long derivedKey, empty salt, SHA-1, with empty info with missing deriveKey usage",0,{},{}],["Derived key of type name: AES-KW length: 192 using long derivedKey, empty salt, SHA-1, with empty info with wrong (ECDH) key",0,{},{}],["Derived key of type name: AES-KW length: 256 using long derivedKey, empty salt, SHA-1, with empty info",0,{},{}],["Derived key of type name: AES-KW length: 256 using long derivedKey, empty salt, SHA-1, with empty info with bad hash name SHA1",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-KW length: 256 using long derivedKey, empty salt, SHA-1, with empty info with missing deriveKey usage",0,{},{}],["Derived key of type name: AES-KW length: 256 using long derivedKey, empty salt, SHA-1, with empty info with wrong (ECDH) key",0,{},{}],["Derived key of type name: HMAC hash: SHA-1 length: 256 using long derivedKey, empty salt, SHA-1, with empty info",0,{},{}],["Derived key of type name: HMAC hash: SHA-1 length: 256 using long derivedKey, empty salt, SHA-1, with empty info with bad hash name SHA1",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: HMAC hash: SHA-1 length: 256 using long derivedKey, empty salt, SHA-1, with empty info with missing deriveKey usage",0,{},{}],["Derived key of type name: HMAC hash: SHA-1 length: 256 using long derivedKey, empty salt, SHA-1, with empty info with wrong (ECDH) key",0,{},{}],["Derived key of type name: HMAC hash: SHA-256 length: 256 using long derivedKey, empty salt, SHA-1, with empty info",0,{},{}],["Derived key of type name: HMAC hash: SHA-256 length: 256 using long derivedKey, empty salt, SHA-1, with empty info with bad hash name SHA1",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: HMAC hash: SHA-256 length: 256 using long derivedKey, empty salt, SHA-1, with empty info with missing deriveKey usage",0,{},{}],["Derived key of type name: HMAC hash: SHA-256 length: 256 using long derivedKey, empty salt, SHA-1, with empty info with wrong (ECDH) key",0,{},{}],["Derived key of type name: HMAC hash: SHA-384 length: 256 using long derivedKey, empty salt, SHA-1, with empty info",0,{},{}],["Derived key of type name: HMAC hash: SHA-384 length: 256 using long derivedKey, empty salt, SHA-1, with empty info with bad hash name SHA1",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: HMAC hash: SHA-384 length: 256 using long derivedKey, empty salt, SHA-1, with empty info with missing deriveKey usage",0,{},{}],["Derived key of type name: HMAC hash: SHA-384 length: 256 using long derivedKey, empty salt, SHA-1, with empty info with wrong (ECDH) key",0,{},{}],["Derived key of type name: HMAC hash: SHA-512 length: 256 using long derivedKey, empty salt, SHA-1, with empty info",0,{},{}],["Derived key of type name: HMAC hash: SHA-512 length: 256 using long derivedKey, empty salt, SHA-1, with empty info with bad hash name SHA1",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: HMAC hash: SHA-512 length: 256 using long derivedKey, empty salt, SHA-1, with empty info with missing deriveKey usage",0,{},{}],["Derived key of type name: HMAC hash: SHA-512 length: 256 using long derivedKey, empty salt, SHA-1, with empty info with wrong (ECDH) key",0,{},{}],["long derivedKey, empty salt, SHA-1, with empty info with missing salt",1,"assert_equals: deriveBits missing salt correctly threw OperationError: An invalid or illegal string was specified expected \"TypeError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:128:33\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:124:36\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:123:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["long derivedKey, empty salt, SHA-1, with empty info with missing info",1,"assert_equals: deriveBits missing info correctly threw OperationError: An invalid or illegal string was specified expected \"TypeError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:138:33\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:134:36\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:133:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["long derivedKey, empty salt, SHA-1, with empty info with null length",1,"assert_equals: deriveBits with null length correctly threw OperationError: Data provided to an operation does not meet requirements expected \"TypeError\" but got \"DataError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:148:33\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:144:36\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:143:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["long derivedKey, empty salt, SHA-1, with empty info with non-multiple of 8 length",1,"assert_unreached: non-multiple of 8 length should have thrown an OperationError Reached unreachable code","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:156:33\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:154:36\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:153:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["long derivedKey, empty salt, SHA-1, with empty info with bad hash name SHA1",1,"assert_equals: deriveBits with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:170:33\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:166:36\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:164:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["long derivedKey, empty salt, SHA-1, with empty info with missing deriveBits usage",0,{},{}],["long derivedKey, empty salt, SHA-1, with empty info with wrong (ECDH) key",0,{},{}],["long derivedKey, empty salt, SHA-256, with normal info",0,{},{}],["long derivedKey, empty salt, SHA-256, with normal info with 0 length",1,"assert_equals: deriveBits with 0 length correctly threw OperationError: Data provided to an operation does not meet requirements expected \"OperationError\" but got \"DataError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:54:33\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:50:36\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:49:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-CBC length: 128 using long derivedKey, empty salt, SHA-256, with normal info",0,{},{}],["Derived key of type name: AES-CBC length: 128 using long derivedKey, empty salt, SHA-256, with normal info with bad hash name SHA256",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-CBC length: 128 using long derivedKey, empty salt, SHA-256, with normal info with missing deriveKey usage",0,{},{}],["Derived key of type name: AES-CBC length: 128 using long derivedKey, empty salt, SHA-256, with normal info with wrong (ECDH) key",0,{},{}],["Derived key of type name: AES-CBC length: 192 using long derivedKey, empty salt, SHA-256, with normal info",0,{},{}],["Derived key of type name: AES-CBC length: 192 using long derivedKey, empty salt, SHA-256, with normal info with bad hash name SHA256",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-CBC length: 192 using long derivedKey, empty salt, SHA-256, with normal info with missing deriveKey usage",0,{},{}],["Derived key of type name: AES-CBC length: 192 using long derivedKey, empty salt, SHA-256, with normal info with wrong (ECDH) key",0,{},{}],["Derived key of type name: AES-CBC length: 256 using long derivedKey, empty salt, SHA-256, with normal info",0,{},{}],["Derived key of type name: AES-CBC length: 256 using long derivedKey, empty salt, SHA-256, with normal info with bad hash name SHA256",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-CBC length: 256 using long derivedKey, empty salt, SHA-256, with normal info with missing deriveKey usage",0,{},{}],["Derived key of type name: AES-CBC length: 256 using long derivedKey, empty salt, SHA-256, with normal info with wrong (ECDH) key",0,{},{}],["Derived key of type name: AES-CTR length: 128 using long derivedKey, empty salt, SHA-256, with normal info",0,{},{}],["Derived key of type name: AES-CTR length: 128 using long derivedKey, empty salt, SHA-256, with normal info with bad hash name SHA256",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-CTR length: 128 using long derivedKey, empty salt, SHA-256, with normal info with missing deriveKey usage",0,{},{}],["Derived key of type name: AES-CTR length: 128 using long derivedKey, empty salt, SHA-256, with normal info with wrong (ECDH) key",0,{},{}],["Derived key of type name: AES-CTR length: 192 using long derivedKey, empty salt, SHA-256, with normal info",0,{},{}],["Derived key of type name: AES-CTR length: 192 using long derivedKey, empty salt, SHA-256, with normal info with bad hash name SHA256",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-CTR length: 192 using long derivedKey, empty salt, SHA-256, with normal info with missing deriveKey usage",0,{},{}],["Derived key of type name: AES-CTR length: 192 using long derivedKey, empty salt, SHA-256, with normal info with wrong (ECDH) key",0,{},{}],["Derived key of type name: AES-CTR length: 256 using long derivedKey, empty salt, SHA-256, with normal info",0,{},{}],["Derived key of type name: AES-CTR length: 256 using long derivedKey, empty salt, SHA-256, with normal info with bad hash name SHA256",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-CTR length: 256 using long derivedKey, empty salt, SHA-256, with normal info with missing deriveKey usage",0,{},{}],["Derived key of type name: AES-CTR length: 256 using long derivedKey, empty salt, SHA-256, with normal info with wrong (ECDH) key",0,{},{}],["Derived key of type name: AES-GCM length: 128 using long derivedKey, empty salt, SHA-256, with normal info",0,{},{}],["Derived key of type name: AES-GCM length: 128 using long derivedKey, empty salt, SHA-256, with normal info with bad hash name SHA256",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-GCM length: 128 using long derivedKey, empty salt, SHA-256, with normal info with missing deriveKey usage",0,{},{}],["Derived key of type name: AES-GCM length: 128 using long derivedKey, empty salt, SHA-256, with normal info with wrong (ECDH) key",0,{},{}],["Derived key of type name: AES-GCM length: 192 using long derivedKey, empty salt, SHA-256, with normal info",0,{},{}],["Derived key of type name: AES-GCM length: 192 using long derivedKey, empty salt, SHA-256, with normal info with bad hash name SHA256",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-GCM length: 192 using long derivedKey, empty salt, SHA-256, with normal info with missing deriveKey usage",0,{},{}],["Derived key of type name: AES-GCM length: 192 using long derivedKey, empty salt, SHA-256, with normal info with wrong (ECDH) key",0,{},{}],["Derived key of type name: AES-GCM length: 256 using long derivedKey, empty salt, SHA-256, with normal info",0,{},{}],["Derived key of type name: AES-GCM length: 256 using long derivedKey, empty salt, SHA-256, with normal info with bad hash name SHA256",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-GCM length: 256 using long derivedKey, empty salt, SHA-256, with normal info with missing deriveKey usage",0,{},{}],["Derived key of type name: AES-GCM length: 256 using long derivedKey, empty salt, SHA-256, with normal info with wrong (ECDH) key",0,{},{}],["Derived key of type name: AES-KW length: 128 using long derivedKey, empty salt, SHA-256, with normal info",0,{},{}],["Derived key of type name: AES-KW length: 128 using long derivedKey, empty salt, SHA-256, with normal info with bad hash name SHA256",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-KW length: 128 using long derivedKey, empty salt, SHA-256, with normal info with missing deriveKey usage",0,{},{}],["Derived key of type name: AES-KW length: 128 using long derivedKey, empty salt, SHA-256, with normal info with wrong (ECDH) key",0,{},{}],["Derived key of type name: AES-KW length: 192 using long derivedKey, empty salt, SHA-256, with normal info",0,{},{}],["Derived key of type name: AES-KW length: 192 using long derivedKey, empty salt, SHA-256, with normal info with bad hash name SHA256",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-KW length: 192 using long derivedKey, empty salt, SHA-256, with normal info with missing deriveKey usage",0,{},{}],["Derived key of type name: AES-KW length: 192 using long derivedKey, empty salt, SHA-256, with normal info with wrong (ECDH) key",0,{},{}],["Derived key of type name: AES-KW length: 256 using long derivedKey, empty salt, SHA-256, with normal info",0,{},{}],["Derived key of type name: AES-KW length: 256 using long derivedKey, empty salt, SHA-256, with normal info with bad hash name SHA256",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-KW length: 256 using long derivedKey, empty salt, SHA-256, with normal info with missing deriveKey usage",0,{},{}],["Derived key of type name: AES-KW length: 256 using long derivedKey, empty salt, SHA-256, with normal info with wrong (ECDH) key",0,{},{}],["Derived key of type name: HMAC hash: SHA-1 length: 256 using long derivedKey, empty salt, SHA-256, with normal info",0,{},{}],["Derived key of type name: HMAC hash: SHA-1 length: 256 using long derivedKey, empty salt, SHA-256, with normal info with bad hash name SHA256",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: HMAC hash: SHA-1 length: 256 using long derivedKey, empty salt, SHA-256, with normal info with missing deriveKey usage",0,{},{}],["Derived key of type name: HMAC hash: SHA-1 length: 256 using long derivedKey, empty salt, SHA-256, with normal info with wrong (ECDH) key",0,{},{}],["Derived key of type name: HMAC hash: SHA-256 length: 256 using long derivedKey, empty salt, SHA-256, with normal info",0,{},{}],["Derived key of type name: HMAC hash: SHA-256 length: 256 using long derivedKey, empty salt, SHA-256, with normal info with bad hash name SHA256",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: HMAC hash: SHA-256 length: 256 using long derivedKey, empty salt, SHA-256, with normal info with missing deriveKey usage",0,{},{}],["Derived key of type name: HMAC hash: SHA-256 length: 256 using long derivedKey, empty salt, SHA-256, with normal info with wrong (ECDH) key",0,{},{}],["Derived key of type name: HMAC hash: SHA-384 length: 256 using long derivedKey, empty salt, SHA-256, with normal info",0,{},{}],["Derived key of type name: HMAC hash: SHA-384 length: 256 using long derivedKey, empty salt, SHA-256, with normal info with bad hash name SHA256",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: HMAC hash: SHA-384 length: 256 using long derivedKey, empty salt, SHA-256, with normal info with missing deriveKey usage",0,{},{}],["Derived key of type name: HMAC hash: SHA-384 length: 256 using long derivedKey, empty salt, SHA-256, with normal info with wrong (ECDH) key",0,{},{}],["Derived key of type name: HMAC hash: SHA-512 length: 256 using long derivedKey, empty salt, SHA-256, with normal info",0,{},{}],["Derived key of type name: HMAC hash: SHA-512 length: 256 using long derivedKey, empty salt, SHA-256, with normal info with bad hash name SHA256",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: HMAC hash: SHA-512 length: 256 using long derivedKey, empty salt, SHA-256, with normal info with missing deriveKey usage",0,{},{}],["Derived key of type name: HMAC hash: SHA-512 length: 256 using long derivedKey, empty salt, SHA-256, with normal info with wrong (ECDH) key",0,{},{}],["long derivedKey, empty salt, SHA-256, with normal info with missing salt",1,"assert_equals: deriveBits missing salt correctly threw OperationError: An invalid or illegal string was specified expected \"TypeError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:128:33\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:124:36\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:123:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["long derivedKey, empty salt, SHA-256, with normal info with missing info",1,"assert_equals: deriveBits missing info correctly threw OperationError: An invalid or illegal string was specified expected \"TypeError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:138:33\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:134:36\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:133:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["long derivedKey, empty salt, SHA-256, with normal info with null length",1,"assert_equals: deriveBits with null length correctly threw OperationError: Data provided to an operation does not meet requirements expected \"TypeError\" but got \"DataError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:148:33\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:144:36\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:143:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["long derivedKey, empty salt, SHA-256, with normal info with non-multiple of 8 length",1,"assert_unreached: non-multiple of 8 length should have thrown an OperationError Reached unreachable code","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:156:33\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:154:36\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:153:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["long derivedKey, empty salt, SHA-256, with normal info with bad hash name SHA256",1,"assert_equals: deriveBits with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:170:33\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:166:36\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:164:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["long derivedKey, empty salt, SHA-256, with normal info with missing deriveBits usage",0,{},{}],["long derivedKey, empty salt, SHA-256, with normal info with wrong (ECDH) key",0,{},{}],["long derivedKey, empty salt, SHA-256, with empty info",0,{},{}],["long derivedKey, empty salt, SHA-256, with empty info with 0 length",1,"assert_equals: deriveBits with 0 length correctly threw OperationError: Data provided to an operation does not meet requirements expected \"OperationError\" but got \"DataError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:54:33\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:50:36\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:49:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-CBC length: 128 using long derivedKey, empty salt, SHA-256, with empty info",0,{},{}],["Derived key of type name: AES-CBC length: 128 using long derivedKey, empty salt, SHA-256, with empty info with bad hash name SHA256",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-CBC length: 128 using long derivedKey, empty salt, SHA-256, with empty info with missing deriveKey usage",0,{},{}],["Derived key of type name: AES-CBC length: 128 using long derivedKey, empty salt, SHA-256, with empty info with wrong (ECDH) key",0,{},{}],["Derived key of type name: AES-CBC length: 192 using long derivedKey, empty salt, SHA-256, with empty info",0,{},{}],["Derived key of type name: AES-CBC length: 192 using long derivedKey, empty salt, SHA-256, with empty info with bad hash name SHA256",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-CBC length: 192 using long derivedKey, empty salt, SHA-256, with empty info with missing deriveKey usage",0,{},{}],["Derived key of type name: AES-CBC length: 192 using long derivedKey, empty salt, SHA-256, with empty info with wrong (ECDH) key",0,{},{}],["Derived key of type name: AES-CBC length: 256 using long derivedKey, empty salt, SHA-256, with empty info",0,{},{}],["Derived key of type name: AES-CBC length: 256 using long derivedKey, empty salt, SHA-256, with empty info with bad hash name SHA256",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-CBC length: 256 using long derivedKey, empty salt, SHA-256, with empty info with missing deriveKey usage",0,{},{}],["Derived key of type name: AES-CBC length: 256 using long derivedKey, empty salt, SHA-256, with empty info with wrong (ECDH) key",0,{},{}],["Derived key of type name: AES-CTR length: 128 using long derivedKey, empty salt, SHA-256, with empty info",0,{},{}],["Derived key of type name: AES-CTR length: 128 using long derivedKey, empty salt, SHA-256, with empty info with bad hash name SHA256",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-CTR length: 128 using long derivedKey, empty salt, SHA-256, with empty info with missing deriveKey usage",0,{},{}],["Derived key of type name: AES-CTR length: 128 using long derivedKey, empty salt, SHA-256, with empty info with wrong (ECDH) key",0,{},{}],["Derived key of type name: AES-CTR length: 192 using long derivedKey, empty salt, SHA-256, with empty info",0,{},{}],["Derived key of type name: AES-CTR length: 192 using long derivedKey, empty salt, SHA-256, with empty info with bad hash name SHA256",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-CTR length: 192 using long derivedKey, empty salt, SHA-256, with empty info with missing deriveKey usage",0,{},{}],["Derived key of type name: AES-CTR length: 192 using long derivedKey, empty salt, SHA-256, with empty info with wrong (ECDH) key",0,{},{}],["Derived key of type name: AES-CTR length: 256 using long derivedKey, empty salt, SHA-256, with empty info",0,{},{}],["Derived key of type name: AES-CTR length: 256 using long derivedKey, empty salt, SHA-256, with empty info with bad hash name SHA256",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-CTR length: 256 using long derivedKey, empty salt, SHA-256, with empty info with missing deriveKey usage",0,{},{}],["Derived key of type name: AES-CTR length: 256 using long derivedKey, empty salt, SHA-256, with empty info with wrong (ECDH) key",0,{},{}],["Derived key of type name: AES-GCM length: 128 using long derivedKey, empty salt, SHA-256, with empty info",0,{},{}],["Derived key of type name: AES-GCM length: 128 using long derivedKey, empty salt, SHA-256, with empty info with bad hash name SHA256",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-GCM length: 128 using long derivedKey, empty salt, SHA-256, with empty info with missing deriveKey usage",0,{},{}],["Derived key of type name: AES-GCM length: 128 using long derivedKey, empty salt, SHA-256, with empty info with wrong (ECDH) key",0,{},{}],["Derived key of type name: AES-GCM length: 192 using long derivedKey, empty salt, SHA-256, with empty info",0,{},{}],["Derived key of type name: AES-GCM length: 192 using long derivedKey, empty salt, SHA-256, with empty info with bad hash name SHA256",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-GCM length: 192 using long derivedKey, empty salt, SHA-256, with empty info with missing deriveKey usage",0,{},{}],["Derived key of type name: AES-GCM length: 192 using long derivedKey, empty salt, SHA-256, with empty info with wrong (ECDH) key",0,{},{}],["Derived key of type name: AES-GCM length: 256 using long derivedKey, empty salt, SHA-256, with empty info",0,{},{}],["Derived key of type name: AES-GCM length: 256 using long derivedKey, empty salt, SHA-256, with empty info with bad hash name SHA256",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-GCM length: 256 using long derivedKey, empty salt, SHA-256, with empty info with missing deriveKey usage",0,{},{}],["Derived key of type name: AES-GCM length: 256 using long derivedKey, empty salt, SHA-256, with empty info with wrong (ECDH) key",0,{},{}],["Derived key of type name: AES-KW length: 128 using long derivedKey, empty salt, SHA-256, with empty info",0,{},{}],["Derived key of type name: AES-KW length: 128 using long derivedKey, empty salt, SHA-256, with empty info with bad hash name SHA256",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-KW length: 128 using long derivedKey, empty salt, SHA-256, with empty info with missing deriveKey usage",0,{},{}],["Derived key of type name: AES-KW length: 128 using long derivedKey, empty salt, SHA-256, with empty info with wrong (ECDH) key",0,{},{}],["Derived key of type name: AES-KW length: 192 using long derivedKey, empty salt, SHA-256, with empty info",0,{},{}],["Derived key of type name: AES-KW length: 192 using long derivedKey, empty salt, SHA-256, with empty info with bad hash name SHA256",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-KW length: 192 using long derivedKey, empty salt, SHA-256, with empty info with missing deriveKey usage",0,{},{}],["Derived key of type name: AES-KW length: 192 using long derivedKey, empty salt, SHA-256, with empty info with wrong (ECDH) key",0,{},{}],["Derived key of type name: AES-KW length: 256 using long derivedKey, empty salt, SHA-256, with empty info",0,{},{}],["Derived key of type name: AES-KW length: 256 using long derivedKey, empty salt, SHA-256, with empty info with bad hash name SHA256",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-KW length: 256 using long derivedKey, empty salt, SHA-256, with empty info with missing deriveKey usage",0,{},{}],["Derived key of type name: AES-KW length: 256 using long derivedKey, empty salt, SHA-256, with empty info with wrong (ECDH) key",0,{},{}],["Derived key of type name: HMAC hash: SHA-1 length: 256 using long derivedKey, empty salt, SHA-256, with empty info",0,{},{}],["Derived key of type name: HMAC hash: SHA-1 length: 256 using long derivedKey, empty salt, SHA-256, with empty info with bad hash name SHA256",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: HMAC hash: SHA-1 length: 256 using long derivedKey, empty salt, SHA-256, with empty info with missing deriveKey usage",0,{},{}],["Derived key of type name: HMAC hash: SHA-1 length: 256 using long derivedKey, empty salt, SHA-256, with empty info with wrong (ECDH) key",0,{},{}],["Derived key of type name: HMAC hash: SHA-256 length: 256 using long derivedKey, empty salt, SHA-256, with empty info",0,{},{}],["Derived key of type name: HMAC hash: SHA-256 length: 256 using long derivedKey, empty salt, SHA-256, with empty info with bad hash name SHA256",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: HMAC hash: SHA-256 length: 256 using long derivedKey, empty salt, SHA-256, with empty info with missing deriveKey usage",0,{},{}],["Derived key of type name: HMAC hash: SHA-256 length: 256 using long derivedKey, empty salt, SHA-256, with empty info with wrong (ECDH) key",0,{},{}],["Derived key of type name: HMAC hash: SHA-384 length: 256 using long derivedKey, empty salt, SHA-256, with empty info",0,{},{}],["Derived key of type name: HMAC hash: SHA-384 length: 256 using long derivedKey, empty salt, SHA-256, with empty info with bad hash name SHA256",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: HMAC hash: SHA-384 length: 256 using long derivedKey, empty salt, SHA-256, with empty info with missing deriveKey usage",0,{},{}],["Derived key of type name: HMAC hash: SHA-384 length: 256 using long derivedKey, empty salt, SHA-256, with empty info with wrong (ECDH) key",0,{},{}],["Derived key of type name: HMAC hash: SHA-512 length: 256 using long derivedKey, empty salt, SHA-256, with empty info",0,{},{}],["Derived key of type name: HMAC hash: SHA-512 length: 256 using long derivedKey, empty salt, SHA-256, with empty info with bad hash name SHA256",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: HMAC hash: SHA-512 length: 256 using long derivedKey, empty salt, SHA-256, with empty info with missing deriveKey usage",0,{},{}],["Derived key of type name: HMAC hash: SHA-512 length: 256 using long derivedKey, empty salt, SHA-256, with empty info with wrong (ECDH) key",0,{},{}],["long derivedKey, empty salt, SHA-256, with empty info with missing salt",1,"assert_equals: deriveBits missing salt correctly threw OperationError: An invalid or illegal string was specified expected \"TypeError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:128:33\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:124:36\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:123:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["long derivedKey, empty salt, SHA-256, with empty info with missing info",1,"assert_equals: deriveBits missing info correctly threw OperationError: An invalid or illegal string was specified expected \"TypeError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:138:33\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:134:36\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:133:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["long derivedKey, empty salt, SHA-256, with empty info with null length",1,"assert_equals: deriveBits with null length correctly threw OperationError: Data provided to an operation does not meet requirements expected \"TypeError\" but got \"DataError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:148:33\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:144:36\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:143:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["long derivedKey, empty salt, SHA-256, with empty info with non-multiple of 8 length",1,"assert_unreached: non-multiple of 8 length should have thrown an OperationError Reached unreachable code","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:156:33\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:154:36\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:153:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["long derivedKey, empty salt, SHA-256, with empty info with bad hash name SHA256",1,"assert_equals: deriveBits with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:170:33\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:166:36\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:164:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["long derivedKey, empty salt, SHA-256, with empty info with missing deriveBits usage",0,{},{}],["long derivedKey, empty salt, SHA-256, with empty info with wrong (ECDH) key",0,{},{}],["long derivedKey, empty salt, PBKDF2, with normal info with non-digest algorithm PBKDF2",0,{},{}],["Derived key of type name: AES-CBC length: 128 using long derivedKey, empty salt, PBKDF2, with normal info",0,{},{}],["Derived key of type name: AES-CBC length: 192 using long derivedKey, empty salt, PBKDF2, with normal info",0,{},{}],["Derived key of type name: AES-CBC length: 256 using long derivedKey, empty salt, PBKDF2, with normal info",0,{},{}],["Derived key of type name: AES-CTR length: 128 using long derivedKey, empty salt, PBKDF2, with normal info",0,{},{}],["Derived key of type name: AES-CTR length: 192 using long derivedKey, empty salt, PBKDF2, with normal info",0,{},{}],["Derived key of type name: AES-CTR length: 256 using long derivedKey, empty salt, PBKDF2, with normal info",0,{},{}],["Derived key of type name: AES-GCM length: 128 using long derivedKey, empty salt, PBKDF2, with normal info",0,{},{}],["Derived key of type name: AES-GCM length: 192 using long derivedKey, empty salt, PBKDF2, with normal info",0,{},{}],["Derived key of type name: AES-GCM length: 256 using long derivedKey, empty salt, PBKDF2, with normal info",0,{},{}],["Derived key of type name: AES-KW length: 128 using long derivedKey, empty salt, PBKDF2, with normal info",0,{},{}],["Derived key of type name: AES-KW length: 192 using long derivedKey, empty salt, PBKDF2, with normal info",0,{},{}],["Derived key of type name: AES-KW length: 256 using long derivedKey, empty salt, PBKDF2, with normal info",0,{},{}],["Derived key of type name: HMAC hash: SHA-1 length: 256 using long derivedKey, empty salt, PBKDF2, with normal info",0,{},{}],["Derived key of type name: HMAC hash: SHA-256 length: 256 using long derivedKey, empty salt, PBKDF2, with normal info",0,{},{}],["Derived key of type name: HMAC hash: SHA-384 length: 256 using long derivedKey, empty salt, PBKDF2, with normal info",0,{},{}],["Derived key of type name: HMAC hash: SHA-512 length: 256 using long derivedKey, empty salt, PBKDF2, with normal info",0,{},{}],["long derivedKey, empty salt, PBKDF2, with empty info with non-digest algorithm PBKDF2",0,{},{}],["Derived key of type name: AES-CBC length: 128 using long derivedKey, empty salt, PBKDF2, with empty info",0,{},{}],["Derived key of type name: AES-CBC length: 192 using long derivedKey, empty salt, PBKDF2, with empty info",0,{},{}],["Derived key of type name: AES-CBC length: 256 using long derivedKey, empty salt, PBKDF2, with empty info",0,{},{}],["Derived key of type name: AES-CTR length: 128 using long derivedKey, empty salt, PBKDF2, with empty info",0,{},{}],["Derived key of type name: AES-CTR length: 192 using long derivedKey, empty salt, PBKDF2, with empty info",0,{},{}],["Derived key of type name: AES-CTR length: 256 using long derivedKey, empty salt, PBKDF2, with empty info",0,{},{}],["Derived key of type name: AES-GCM length: 128 using long derivedKey, empty salt, PBKDF2, with empty info",0,{},{}],["Derived key of type name: AES-GCM length: 192 using long derivedKey, empty salt, PBKDF2, with empty info",0,{},{}],["Derived key of type name: AES-GCM length: 256 using long derivedKey, empty salt, PBKDF2, with empty info",0,{},{}],["Derived key of type name: AES-KW length: 128 using long derivedKey, empty salt, PBKDF2, with empty info",0,{},{}],["Derived key of type name: AES-KW length: 192 using long derivedKey, empty salt, PBKDF2, with empty info",0,{},{}],["Derived key of type name: AES-KW length: 256 using long derivedKey, empty salt, PBKDF2, with empty info",0,{},{}],["Derived key of type name: HMAC hash: SHA-1 length: 256 using long derivedKey, empty salt, PBKDF2, with empty info",0,{},{}],["Derived key of type name: HMAC hash: SHA-256 length: 256 using long derivedKey, empty salt, PBKDF2, with empty info",0,{},{}],["Derived key of type name: HMAC hash: SHA-384 length: 256 using long derivedKey, empty salt, PBKDF2, with empty info",0,{},{}],["Derived key of type name: HMAC hash: SHA-512 length: 256 using long derivedKey, empty salt, PBKDF2, with empty info",0,{},{}],["empty derivedKey, normal salt, SHA-384, with normal info",1,"assert_unreached: deriveBits failed with error TypeError: Argument 2 of SubtleCrypto.deriveBits is not an object. Reached unreachable code","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:44:33\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:40:36\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:39:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["empty derivedKey, normal salt, SHA-384, with normal info with 0 length",1,"assert_equals: deriveBits with 0 length correctly threw OperationError: Argument 2 of SubtleCrypto.deriveBits is not an object. expected \"OperationError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:54:33\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:50:36\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:49:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-CBC length: 128 using empty derivedKey, normal salt, SHA-384, with normal info",1,"assert_unreached: deriveKey failed with error TypeError: Argument 2 of SubtleCrypto.deriveKey is not an object. Reached unreachable code","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:79:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:69:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:68:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-CBC length: 128 using empty derivedKey, normal salt, SHA-384, with normal info with bad hash name SHA384",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"NotSupportedError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-CBC length: 128 using empty derivedKey, normal salt, SHA-384, with normal info with missing deriveKey usage",1,"assert_equals: deriveKey with missing deriveKey usage correctly threw InvalidAccessError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"InvalidAccessError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:104:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:100:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:99:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-CBC length: 128 using empty derivedKey, normal salt, SHA-384, with normal info with wrong (ECDH) key",0,{},{}],["Derived key of type name: AES-CBC length: 192 using empty derivedKey, normal salt, SHA-384, with normal info",1,"assert_unreached: deriveKey failed with error TypeError: Argument 2 of SubtleCrypto.deriveKey is not an object. Reached unreachable code","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:79:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:69:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:68:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-CBC length: 192 using empty derivedKey, normal salt, SHA-384, with normal info with bad hash name SHA384",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"NotSupportedError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-CBC length: 192 using empty derivedKey, normal salt, SHA-384, with normal info with missing deriveKey usage",1,"assert_equals: deriveKey with missing deriveKey usage correctly threw InvalidAccessError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"InvalidAccessError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:104:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:100:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:99:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-CBC length: 192 using empty derivedKey, normal salt, SHA-384, with normal info with wrong (ECDH) key",0,{},{}],["Derived key of type name: AES-CBC length: 256 using empty derivedKey, normal salt, SHA-384, with normal info",1,"assert_unreached: deriveKey failed with error TypeError: Argument 2 of SubtleCrypto.deriveKey is not an object. Reached unreachable code","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:79:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:69:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:68:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-CBC length: 256 using empty derivedKey, normal salt, SHA-384, with normal info with bad hash name SHA384",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"NotSupportedError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-CBC length: 256 using empty derivedKey, normal salt, SHA-384, with normal info with missing deriveKey usage",1,"assert_equals: deriveKey with missing deriveKey usage correctly threw InvalidAccessError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"InvalidAccessError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:104:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:100:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:99:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-CBC length: 256 using empty derivedKey, normal salt, SHA-384, with normal info with wrong (ECDH) key",0,{},{}],["Derived key of type name: AES-CTR length: 128 using empty derivedKey, normal salt, SHA-384, with normal info",1,"assert_unreached: deriveKey failed with error TypeError: Argument 2 of SubtleCrypto.deriveKey is not an object. Reached unreachable code","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:79:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:69:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:68:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-CTR length: 128 using empty derivedKey, normal salt, SHA-384, with normal info with bad hash name SHA384",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"NotSupportedError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-CTR length: 128 using empty derivedKey, normal salt, SHA-384, with normal info with missing deriveKey usage",1,"assert_equals: deriveKey with missing deriveKey usage correctly threw InvalidAccessError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"InvalidAccessError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:104:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:100:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:99:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-CTR length: 128 using empty derivedKey, normal salt, SHA-384, with normal info with wrong (ECDH) key",0,{},{}],["Derived key of type name: AES-CTR length: 192 using empty derivedKey, normal salt, SHA-384, with normal info",1,"assert_unreached: deriveKey failed with error TypeError: Argument 2 of SubtleCrypto.deriveKey is not an object. Reached unreachable code","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:79:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:69:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:68:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-CTR length: 192 using empty derivedKey, normal salt, SHA-384, with normal info with bad hash name SHA384",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"NotSupportedError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-CTR length: 192 using empty derivedKey, normal salt, SHA-384, with normal info with missing deriveKey usage",1,"assert_equals: deriveKey with missing deriveKey usage correctly threw InvalidAccessError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"InvalidAccessError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:104:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:100:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:99:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-CTR length: 192 using empty derivedKey, normal salt, SHA-384, with normal info with wrong (ECDH) key",0,{},{}],["Derived key of type name: AES-CTR length: 256 using empty derivedKey, normal salt, SHA-384, with normal info",1,"assert_unreached: deriveKey failed with error TypeError: Argument 2 of SubtleCrypto.deriveKey is not an object. Reached unreachable code","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:79:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:69:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:68:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-CTR length: 256 using empty derivedKey, normal salt, SHA-384, with normal info with bad hash name SHA384",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"NotSupportedError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-CTR length: 256 using empty derivedKey, normal salt, SHA-384, with normal info with missing deriveKey usage",1,"assert_equals: deriveKey with missing deriveKey usage correctly threw InvalidAccessError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"InvalidAccessError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:104:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:100:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:99:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-CTR length: 256 using empty derivedKey, normal salt, SHA-384, with normal info with wrong (ECDH) key",0,{},{}],["Derived key of type name: AES-GCM length: 128 using empty derivedKey, normal salt, SHA-384, with normal info",1,"assert_unreached: deriveKey failed with error TypeError: Argument 2 of SubtleCrypto.deriveKey is not an object. Reached unreachable code","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:79:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:69:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:68:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-GCM length: 128 using empty derivedKey, normal salt, SHA-384, with normal info with bad hash name SHA384",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"NotSupportedError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-GCM length: 128 using empty derivedKey, normal salt, SHA-384, with normal info with missing deriveKey usage",1,"assert_equals: deriveKey with missing deriveKey usage correctly threw InvalidAccessError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"InvalidAccessError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:104:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:100:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:99:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-GCM length: 128 using empty derivedKey, normal salt, SHA-384, with normal info with wrong (ECDH) key",0,{},{}],["Derived key of type name: AES-GCM length: 192 using empty derivedKey, normal salt, SHA-384, with normal info",1,"assert_unreached: deriveKey failed with error TypeError: Argument 2 of SubtleCrypto.deriveKey is not an object. Reached unreachable code","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:79:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:69:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:68:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-GCM length: 192 using empty derivedKey, normal salt, SHA-384, with normal info with bad hash name SHA384",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"NotSupportedError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-GCM length: 192 using empty derivedKey, normal salt, SHA-384, with normal info with missing deriveKey usage",1,"assert_equals: deriveKey with missing deriveKey usage correctly threw InvalidAccessError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"InvalidAccessError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:104:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:100:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:99:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-GCM length: 192 using empty derivedKey, normal salt, SHA-384, with normal info with wrong (ECDH) key",0,{},{}],["Derived key of type name: AES-GCM length: 256 using empty derivedKey, normal salt, SHA-384, with normal info",1,"assert_unreached: deriveKey failed with error TypeError: Argument 2 of SubtleCrypto.deriveKey is not an object. Reached unreachable code","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:79:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:69:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:68:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-GCM length: 256 using empty derivedKey, normal salt, SHA-384, with normal info with bad hash name SHA384",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"NotSupportedError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-GCM length: 256 using empty derivedKey, normal salt, SHA-384, with normal info with missing deriveKey usage",1,"assert_equals: deriveKey with missing deriveKey usage correctly threw InvalidAccessError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"InvalidAccessError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:104:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:100:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:99:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-GCM length: 256 using empty derivedKey, normal salt, SHA-384, with normal info with wrong (ECDH) key",0,{},{}],["Derived key of type name: AES-KW length: 128 using empty derivedKey, normal salt, SHA-384, with normal info",1,"assert_unreached: deriveKey failed with error TypeError: Argument 2 of SubtleCrypto.deriveKey is not an object. Reached unreachable code","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:79:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:69:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:68:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-KW length: 128 using empty derivedKey, normal salt, SHA-384, with normal info with bad hash name SHA384",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"NotSupportedError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-KW length: 128 using empty derivedKey, normal salt, SHA-384, with normal info with missing deriveKey usage",1,"assert_equals: deriveKey with missing deriveKey usage correctly threw InvalidAccessError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"InvalidAccessError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:104:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:100:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:99:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-KW length: 128 using empty derivedKey, normal salt, SHA-384, with normal info with wrong (ECDH) key",0,{},{}],["Derived key of type name: AES-KW length: 192 using empty derivedKey, normal salt, SHA-384, with normal info",1,"assert_unreached: deriveKey failed with error TypeError: Argument 2 of SubtleCrypto.deriveKey is not an object. Reached unreachable code","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:79:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:69:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:68:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-KW length: 192 using empty derivedKey, normal salt, SHA-384, with normal info with bad hash name SHA384",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"NotSupportedError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-KW length: 192 using empty derivedKey, normal salt, SHA-384, with normal info with missing deriveKey usage",1,"assert_equals: deriveKey with missing deriveKey usage correctly threw InvalidAccessError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"InvalidAccessError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:104:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:100:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:99:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-KW length: 192 using empty derivedKey, normal salt, SHA-384, with normal info with wrong (ECDH) key",0,{},{}],["Derived key of type name: AES-KW length: 256 using empty derivedKey, normal salt, SHA-384, with normal info",1,"assert_unreached: deriveKey failed with error TypeError: Argument 2 of SubtleCrypto.deriveKey is not an object. Reached unreachable code","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:79:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:69:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:68:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-KW length: 256 using empty derivedKey, normal salt, SHA-384, with normal info with bad hash name SHA384",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"NotSupportedError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-KW length: 256 using empty derivedKey, normal salt, SHA-384, with normal info with missing deriveKey usage",1,"assert_equals: deriveKey with missing deriveKey usage correctly threw InvalidAccessError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"InvalidAccessError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:104:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:100:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:99:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-KW length: 256 using empty derivedKey, normal salt, SHA-384, with normal info with wrong (ECDH) key",0,{},{}],["Derived key of type name: HMAC hash: SHA-1 length: 256 using empty derivedKey, normal salt, SHA-384, with normal info",1,"assert_unreached: deriveKey failed with error TypeError: Argument 2 of SubtleCrypto.deriveKey is not an object. Reached unreachable code","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:79:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:69:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:68:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: HMAC hash: SHA-1 length: 256 using empty derivedKey, normal salt, SHA-384, with normal info with bad hash name SHA384",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"NotSupportedError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: HMAC hash: SHA-1 length: 256 using empty derivedKey, normal salt, SHA-384, with normal info with missing deriveKey usage",1,"assert_equals: deriveKey with missing deriveKey usage correctly threw InvalidAccessError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"InvalidAccessError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:104:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:100:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:99:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: HMAC hash: SHA-1 length: 256 using empty derivedKey, normal salt, SHA-384, with normal info with wrong (ECDH) key",0,{},{}],["Derived key of type name: HMAC hash: SHA-256 length: 256 using empty derivedKey, normal salt, SHA-384, with normal info",1,"assert_unreached: deriveKey failed with error TypeError: Argument 2 of SubtleCrypto.deriveKey is not an object. Reached unreachable code","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:79:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:69:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:68:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: HMAC hash: SHA-256 length: 256 using empty derivedKey, normal salt, SHA-384, with normal info with bad hash name SHA384",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"NotSupportedError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: HMAC hash: SHA-256 length: 256 using empty derivedKey, normal salt, SHA-384, with normal info with missing deriveKey usage",1,"assert_equals: deriveKey with missing deriveKey usage correctly threw InvalidAccessError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"InvalidAccessError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:104:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:100:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:99:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: HMAC hash: SHA-256 length: 256 using empty derivedKey, normal salt, SHA-384, with normal info with wrong (ECDH) key",0,{},{}],["Derived key of type name: HMAC hash: SHA-384 length: 256 using empty derivedKey, normal salt, SHA-384, with normal info",1,"assert_unreached: deriveKey failed with error TypeError: Argument 2 of SubtleCrypto.deriveKey is not an object. Reached unreachable code","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:79:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:69:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:68:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: HMAC hash: SHA-384 length: 256 using empty derivedKey, normal salt, SHA-384, with normal info with bad hash name SHA384",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"NotSupportedError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: HMAC hash: SHA-384 length: 256 using empty derivedKey, normal salt, SHA-384, with normal info with missing deriveKey usage",1,"assert_equals: deriveKey with missing deriveKey usage correctly threw InvalidAccessError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"InvalidAccessError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:104:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:100:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:99:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: HMAC hash: SHA-384 length: 256 using empty derivedKey, normal salt, SHA-384, with normal info with wrong (ECDH) key",0,{},{}],["Derived key of type name: HMAC hash: SHA-512 length: 256 using empty derivedKey, normal salt, SHA-384, with normal info",1,"assert_unreached: deriveKey failed with error TypeError: Argument 2 of SubtleCrypto.deriveKey is not an object. Reached unreachable code","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:79:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:69:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:68:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: HMAC hash: SHA-512 length: 256 using empty derivedKey, normal salt, SHA-384, with normal info with bad hash name SHA384",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"NotSupportedError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: HMAC hash: SHA-512 length: 256 using empty derivedKey, normal salt, SHA-384, with normal info with missing deriveKey usage",1,"assert_equals: deriveKey with missing deriveKey usage correctly threw InvalidAccessError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"InvalidAccessError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:104:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:100:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:99:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: HMAC hash: SHA-512 length: 256 using empty derivedKey, normal salt, SHA-384, with normal info with wrong (ECDH) key",0,{},{}],["empty derivedKey, normal salt, SHA-384, with normal info with missing salt",0,{},{}],["empty derivedKey, normal salt, SHA-384, with normal info with missing info",0,{},{}],["empty derivedKey, normal salt, SHA-384, with normal info with null length",0,{},{}],["empty derivedKey, normal salt, SHA-384, with normal info with non-multiple of 8 length",1,"assert_equals: deriveBits with non-multiple of 8 length correctly threw OperationError: Argument 2 of SubtleCrypto.deriveBits is not an object. expected \"OperationError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:158:33\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:154:36\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:153:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["empty derivedKey, normal salt, SHA-384, with normal info with bad hash name SHA384",1,"assert_equals: deriveBits with bad hash name correctly threw NotSupportedError: Argument 2 of SubtleCrypto.deriveBits is not an object. expected \"NotSupportedError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:170:33\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:166:36\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:164:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["empty derivedKey, normal salt, SHA-384, with normal info with missing deriveBits usage",1,"assert_equals: deriveBits with missing deriveBits usage correctly threw InvalidAccessError: Argument 2 of SubtleCrypto.deriveBits is not an object. expected \"InvalidAccessError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:180:33\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:176:36\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:175:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["empty derivedKey, normal salt, SHA-384, with normal info with wrong (ECDH) key",0,{},{}],["empty derivedKey, normal salt, SHA-384, with empty info",1,"assert_unreached: deriveBits failed with error TypeError: Argument 2 of SubtleCrypto.deriveBits is not an object. Reached unreachable code","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:44:33\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:40:36\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:39:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["empty derivedKey, normal salt, SHA-384, with empty info with 0 length",1,"assert_equals: deriveBits with 0 length correctly threw OperationError: Argument 2 of SubtleCrypto.deriveBits is not an object. expected \"OperationError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:54:33\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:50:36\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:49:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-CBC length: 128 using empty derivedKey, normal salt, SHA-384, with empty info",1,"assert_unreached: deriveKey failed with error TypeError: Argument 2 of SubtleCrypto.deriveKey is not an object. Reached unreachable code","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:79:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:69:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:68:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-CBC length: 128 using empty derivedKey, normal salt, SHA-384, with empty info with bad hash name SHA384",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"NotSupportedError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-CBC length: 128 using empty derivedKey, normal salt, SHA-384, with empty info with missing deriveKey usage",1,"assert_equals: deriveKey with missing deriveKey usage correctly threw InvalidAccessError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"InvalidAccessError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:104:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:100:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:99:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-CBC length: 128 using empty derivedKey, normal salt, SHA-384, with empty info with wrong (ECDH) key",0,{},{}],["Derived key of type name: AES-CBC length: 192 using empty derivedKey, normal salt, SHA-384, with empty info",1,"assert_unreached: deriveKey failed with error TypeError: Argument 2 of SubtleCrypto.deriveKey is not an object. Reached unreachable code","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:79:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:69:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:68:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-CBC length: 192 using empty derivedKey, normal salt, SHA-384, with empty info with bad hash name SHA384",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"NotSupportedError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-CBC length: 192 using empty derivedKey, normal salt, SHA-384, with empty info with missing deriveKey usage",1,"assert_equals: deriveKey with missing deriveKey usage correctly threw InvalidAccessError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"InvalidAccessError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:104:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:100:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:99:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-CBC length: 192 using empty derivedKey, normal salt, SHA-384, with empty info with wrong (ECDH) key",0,{},{}],["Derived key of type name: AES-CBC length: 256 using empty derivedKey, normal salt, SHA-384, with empty info",1,"assert_unreached: deriveKey failed with error TypeError: Argument 2 of SubtleCrypto.deriveKey is not an object. Reached unreachable code","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:79:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:69:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:68:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-CBC length: 256 using empty derivedKey, normal salt, SHA-384, with empty info with bad hash name SHA384",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"NotSupportedError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-CBC length: 256 using empty derivedKey, normal salt, SHA-384, with empty info with missing deriveKey usage",1,"assert_equals: deriveKey with missing deriveKey usage correctly threw InvalidAccessError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"InvalidAccessError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:104:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:100:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:99:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-CBC length: 256 using empty derivedKey, normal salt, SHA-384, with empty info with wrong (ECDH) key",0,{},{}],["Derived key of type name: AES-CTR length: 128 using empty derivedKey, normal salt, SHA-384, with empty info",1,"assert_unreached: deriveKey failed with error TypeError: Argument 2 of SubtleCrypto.deriveKey is not an object. Reached unreachable code","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:79:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:69:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:68:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-CTR length: 128 using empty derivedKey, normal salt, SHA-384, with empty info with bad hash name SHA384",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"NotSupportedError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-CTR length: 128 using empty derivedKey, normal salt, SHA-384, with empty info with missing deriveKey usage",1,"assert_equals: deriveKey with missing deriveKey usage correctly threw InvalidAccessError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"InvalidAccessError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:104:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:100:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:99:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-CTR length: 128 using empty derivedKey, normal salt, SHA-384, with empty info with wrong (ECDH) key",0,{},{}],["Derived key of type name: AES-CTR length: 192 using empty derivedKey, normal salt, SHA-384, with empty info",1,"assert_unreached: deriveKey failed with error TypeError: Argument 2 of SubtleCrypto.deriveKey is not an object. Reached unreachable code","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:79:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:69:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:68:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-CTR length: 192 using empty derivedKey, normal salt, SHA-384, with empty info with bad hash name SHA384",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"NotSupportedError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-CTR length: 192 using empty derivedKey, normal salt, SHA-384, with empty info with missing deriveKey usage",1,"assert_equals: deriveKey with missing deriveKey usage correctly threw InvalidAccessError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"InvalidAccessError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:104:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:100:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:99:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-CTR length: 192 using empty derivedKey, normal salt, SHA-384, with empty info with wrong (ECDH) key",0,{},{}],["Derived key of type name: AES-CTR length: 256 using empty derivedKey, normal salt, SHA-384, with empty info",1,"assert_unreached: deriveKey failed with error TypeError: Argument 2 of SubtleCrypto.deriveKey is not an object. Reached unreachable code","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:79:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:69:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:68:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-CTR length: 256 using empty derivedKey, normal salt, SHA-384, with empty info with bad hash name SHA384",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"NotSupportedError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-CTR length: 256 using empty derivedKey, normal salt, SHA-384, with empty info with missing deriveKey usage",1,"assert_equals: deriveKey with missing deriveKey usage correctly threw InvalidAccessError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"InvalidAccessError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:104:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:100:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:99:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-CTR length: 256 using empty derivedKey, normal salt, SHA-384, with empty info with wrong (ECDH) key",0,{},{}],["Derived key of type name: AES-GCM length: 128 using empty derivedKey, normal salt, SHA-384, with empty info",1,"assert_unreached: deriveKey failed with error TypeError: Argument 2 of SubtleCrypto.deriveKey is not an object. Reached unreachable code","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:79:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:69:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:68:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-GCM length: 128 using empty derivedKey, normal salt, SHA-384, with empty info with bad hash name SHA384",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"NotSupportedError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-GCM length: 128 using empty derivedKey, normal salt, SHA-384, with empty info with missing deriveKey usage",1,"assert_equals: deriveKey with missing deriveKey usage correctly threw InvalidAccessError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"InvalidAccessError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:104:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:100:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:99:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-GCM length: 128 using empty derivedKey, normal salt, SHA-384, with empty info with wrong (ECDH) key",0,{},{}],["Derived key of type name: AES-GCM length: 192 using empty derivedKey, normal salt, SHA-384, with empty info",1,"assert_unreached: deriveKey failed with error TypeError: Argument 2 of SubtleCrypto.deriveKey is not an object. Reached unreachable code","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:79:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:69:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:68:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-GCM length: 192 using empty derivedKey, normal salt, SHA-384, with empty info with bad hash name SHA384",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"NotSupportedError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-GCM length: 192 using empty derivedKey, normal salt, SHA-384, with empty info with missing deriveKey usage",1,"assert_equals: deriveKey with missing deriveKey usage correctly threw InvalidAccessError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"InvalidAccessError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:104:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:100:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:99:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-GCM length: 192 using empty derivedKey, normal salt, SHA-384, with empty info with wrong (ECDH) key",0,{},{}],["Derived key of type name: AES-GCM length: 256 using empty derivedKey, normal salt, SHA-384, with empty info",1,"assert_unreached: deriveKey failed with error TypeError: Argument 2 of SubtleCrypto.deriveKey is not an object. Reached unreachable code","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:79:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:69:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:68:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-GCM length: 256 using empty derivedKey, normal salt, SHA-384, with empty info with bad hash name SHA384",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"NotSupportedError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-GCM length: 256 using empty derivedKey, normal salt, SHA-384, with empty info with missing deriveKey usage",1,"assert_equals: deriveKey with missing deriveKey usage correctly threw InvalidAccessError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"InvalidAccessError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:104:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:100:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:99:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-GCM length: 256 using empty derivedKey, normal salt, SHA-384, with empty info with wrong (ECDH) key",0,{},{}],["Derived key of type name: AES-KW length: 128 using empty derivedKey, normal salt, SHA-384, with empty info",1,"assert_unreached: deriveKey failed with error TypeError: Argument 2 of SubtleCrypto.deriveKey is not an object. Reached unreachable code","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:79:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:69:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:68:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-KW length: 128 using empty derivedKey, normal salt, SHA-384, with empty info with bad hash name SHA384",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"NotSupportedError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-KW length: 128 using empty derivedKey, normal salt, SHA-384, with empty info with missing deriveKey usage",1,"assert_equals: deriveKey with missing deriveKey usage correctly threw InvalidAccessError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"InvalidAccessError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:104:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:100:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:99:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-KW length: 128 using empty derivedKey, normal salt, SHA-384, with empty info with wrong (ECDH) key",0,{},{}],["Derived key of type name: AES-KW length: 192 using empty derivedKey, normal salt, SHA-384, with empty info",1,"assert_unreached: deriveKey failed with error TypeError: Argument 2 of SubtleCrypto.deriveKey is not an object. Reached unreachable code","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:79:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:69:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:68:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-KW length: 192 using empty derivedKey, normal salt, SHA-384, with empty info with bad hash name SHA384",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"NotSupportedError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-KW length: 192 using empty derivedKey, normal salt, SHA-384, with empty info with missing deriveKey usage",1,"assert_equals: deriveKey with missing deriveKey usage correctly threw InvalidAccessError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"InvalidAccessError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:104:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:100:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:99:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-KW length: 192 using empty derivedKey, normal salt, SHA-384, with empty info with wrong (ECDH) key",0,{},{}],["Derived key of type name: AES-KW length: 256 using empty derivedKey, normal salt, SHA-384, with empty info",1,"assert_unreached: deriveKey failed with error TypeError: Argument 2 of SubtleCrypto.deriveKey is not an object. Reached unreachable code","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:79:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:69:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:68:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-KW length: 256 using empty derivedKey, normal salt, SHA-384, with empty info with bad hash name SHA384",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"NotSupportedError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-KW length: 256 using empty derivedKey, normal salt, SHA-384, with empty info with missing deriveKey usage",1,"assert_equals: deriveKey with missing deriveKey usage correctly threw InvalidAccessError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"InvalidAccessError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:104:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:100:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:99:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-KW length: 256 using empty derivedKey, normal salt, SHA-384, with empty info with wrong (ECDH) key",0,{},{}],["Derived key of type name: HMAC hash: SHA-1 length: 256 using empty derivedKey, normal salt, SHA-384, with empty info",1,"assert_unreached: deriveKey failed with error TypeError: Argument 2 of SubtleCrypto.deriveKey is not an object. Reached unreachable code","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:79:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:69:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:68:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: HMAC hash: SHA-1 length: 256 using empty derivedKey, normal salt, SHA-384, with empty info with bad hash name SHA384",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"NotSupportedError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: HMAC hash: SHA-1 length: 256 using empty derivedKey, normal salt, SHA-384, with empty info with missing deriveKey usage",1,"assert_equals: deriveKey with missing deriveKey usage correctly threw InvalidAccessError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"InvalidAccessError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:104:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:100:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:99:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: HMAC hash: SHA-1 length: 256 using empty derivedKey, normal salt, SHA-384, with empty info with wrong (ECDH) key",0,{},{}],["Derived key of type name: HMAC hash: SHA-256 length: 256 using empty derivedKey, normal salt, SHA-384, with empty info",1,"assert_unreached: deriveKey failed with error TypeError: Argument 2 of SubtleCrypto.deriveKey is not an object. Reached unreachable code","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:79:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:69:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:68:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: HMAC hash: SHA-256 length: 256 using empty derivedKey, normal salt, SHA-384, with empty info with bad hash name SHA384",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"NotSupportedError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: HMAC hash: SHA-256 length: 256 using empty derivedKey, normal salt, SHA-384, with empty info with missing deriveKey usage",1,"assert_equals: deriveKey with missing deriveKey usage correctly threw InvalidAccessError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"InvalidAccessError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:104:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:100:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:99:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: HMAC hash: SHA-256 length: 256 using empty derivedKey, normal salt, SHA-384, with empty info with wrong (ECDH) key",0,{},{}],["Derived key of type name: HMAC hash: SHA-384 length: 256 using empty derivedKey, normal salt, SHA-384, with empty info",1,"assert_unreached: deriveKey failed with error TypeError: Argument 2 of SubtleCrypto.deriveKey is not an object. Reached unreachable code","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:79:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:69:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:68:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: HMAC hash: SHA-384 length: 256 using empty derivedKey, normal salt, SHA-384, with empty info with bad hash name SHA384",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"NotSupportedError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: HMAC hash: SHA-384 length: 256 using empty derivedKey, normal salt, SHA-384, with empty info with missing deriveKey usage",1,"assert_equals: deriveKey with missing deriveKey usage correctly threw InvalidAccessError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"InvalidAccessError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:104:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:100:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:99:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: HMAC hash: SHA-384 length: 256 using empty derivedKey, normal salt, SHA-384, with empty info with wrong (ECDH) key",0,{},{}],["Derived key of type name: HMAC hash: SHA-512 length: 256 using empty derivedKey, normal salt, SHA-384, with empty info",1,"assert_unreached: deriveKey failed with error TypeError: Argument 2 of SubtleCrypto.deriveKey is not an object. Reached unreachable code","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:79:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:69:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:68:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: HMAC hash: SHA-512 length: 256 using empty derivedKey, normal salt, SHA-384, with empty info with bad hash name SHA384",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"NotSupportedError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: HMAC hash: SHA-512 length: 256 using empty derivedKey, normal salt, SHA-384, with empty info with missing deriveKey usage",1,"assert_equals: deriveKey with missing deriveKey usage correctly threw InvalidAccessError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"InvalidAccessError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:104:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:100:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:99:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: HMAC hash: SHA-512 length: 256 using empty derivedKey, normal salt, SHA-384, with empty info with wrong (ECDH) key",0,{},{}],["empty derivedKey, normal salt, SHA-384, with empty info with missing salt",0,{},{}],["empty derivedKey, normal salt, SHA-384, with empty info with missing info",0,{},{}],["empty derivedKey, normal salt, SHA-384, with empty info with null length",0,{},{}],["empty derivedKey, normal salt, SHA-384, with empty info with non-multiple of 8 length",1,"assert_equals: deriveBits with non-multiple of 8 length correctly threw OperationError: Argument 2 of SubtleCrypto.deriveBits is not an object. expected \"OperationError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:158:33\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:154:36\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:153:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["empty derivedKey, normal salt, SHA-384, with empty info with bad hash name SHA384",1,"assert_equals: deriveBits with bad hash name correctly threw NotSupportedError: Argument 2 of SubtleCrypto.deriveBits is not an object. expected \"NotSupportedError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:170:33\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:166:36\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:164:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["empty derivedKey, normal salt, SHA-384, with empty info with missing deriveBits usage",1,"assert_equals: deriveBits with missing deriveBits usage correctly threw InvalidAccessError: Argument 2 of SubtleCrypto.deriveBits is not an object. expected \"InvalidAccessError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:180:33\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:176:36\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:175:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["empty derivedKey, normal salt, SHA-384, with empty info with wrong (ECDH) key",0,{},{}],["empty derivedKey, normal salt, SHA-512, with normal info",1,"assert_unreached: deriveBits failed with error TypeError: Argument 2 of SubtleCrypto.deriveBits is not an object. Reached unreachable code","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:44:33\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:40:36\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:39:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["empty derivedKey, normal salt, SHA-512, with normal info with 0 length",1,"assert_equals: deriveBits with 0 length correctly threw OperationError: Argument 2 of SubtleCrypto.deriveBits is not an object. expected \"OperationError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:54:33\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:50:36\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:49:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-CBC length: 128 using empty derivedKey, normal salt, SHA-512, with normal info",1,"assert_unreached: deriveKey failed with error TypeError: Argument 2 of SubtleCrypto.deriveKey is not an object. Reached unreachable code","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:79:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:69:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:68:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-CBC length: 128 using empty derivedKey, normal salt, SHA-512, with normal info with bad hash name SHA512",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"NotSupportedError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-CBC length: 128 using empty derivedKey, normal salt, SHA-512, with normal info with missing deriveKey usage",1,"assert_equals: deriveKey with missing deriveKey usage correctly threw InvalidAccessError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"InvalidAccessError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:104:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:100:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:99:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-CBC length: 128 using empty derivedKey, normal salt, SHA-512, with normal info with wrong (ECDH) key",0,{},{}],["Derived key of type name: AES-CBC length: 192 using empty derivedKey, normal salt, SHA-512, with normal info",1,"assert_unreached: deriveKey failed with error TypeError: Argument 2 of SubtleCrypto.deriveKey is not an object. Reached unreachable code","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:79:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:69:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:68:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-CBC length: 192 using empty derivedKey, normal salt, SHA-512, with normal info with bad hash name SHA512",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"NotSupportedError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-CBC length: 192 using empty derivedKey, normal salt, SHA-512, with normal info with missing deriveKey usage",1,"assert_equals: deriveKey with missing deriveKey usage correctly threw InvalidAccessError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"InvalidAccessError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:104:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:100:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:99:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-CBC length: 192 using empty derivedKey, normal salt, SHA-512, with normal info with wrong (ECDH) key",0,{},{}],["Derived key of type name: AES-CBC length: 256 using empty derivedKey, normal salt, SHA-512, with normal info",1,"assert_unreached: deriveKey failed with error TypeError: Argument 2 of SubtleCrypto.deriveKey is not an object. Reached unreachable code","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:79:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:69:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:68:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-CBC length: 256 using empty derivedKey, normal salt, SHA-512, with normal info with bad hash name SHA512",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"NotSupportedError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-CBC length: 256 using empty derivedKey, normal salt, SHA-512, with normal info with missing deriveKey usage",1,"assert_equals: deriveKey with missing deriveKey usage correctly threw InvalidAccessError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"InvalidAccessError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:104:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:100:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:99:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-CBC length: 256 using empty derivedKey, normal salt, SHA-512, with normal info with wrong (ECDH) key",0,{},{}],["Derived key of type name: AES-CTR length: 128 using empty derivedKey, normal salt, SHA-512, with normal info",1,"assert_unreached: deriveKey failed with error TypeError: Argument 2 of SubtleCrypto.deriveKey is not an object. Reached unreachable code","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:79:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:69:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:68:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-CTR length: 128 using empty derivedKey, normal salt, SHA-512, with normal info with bad hash name SHA512",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"NotSupportedError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-CTR length: 128 using empty derivedKey, normal salt, SHA-512, with normal info with missing deriveKey usage",1,"assert_equals: deriveKey with missing deriveKey usage correctly threw InvalidAccessError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"InvalidAccessError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:104:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:100:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:99:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-CTR length: 128 using empty derivedKey, normal salt, SHA-512, with normal info with wrong (ECDH) key",0,{},{}],["Derived key of type name: AES-CTR length: 192 using empty derivedKey, normal salt, SHA-512, with normal info",1,"assert_unreached: deriveKey failed with error TypeError: Argument 2 of SubtleCrypto.deriveKey is not an object. Reached unreachable code","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:79:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:69:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:68:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-CTR length: 192 using empty derivedKey, normal salt, SHA-512, with normal info with bad hash name SHA512",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"NotSupportedError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-CTR length: 192 using empty derivedKey, normal salt, SHA-512, with normal info with missing deriveKey usage",1,"assert_equals: deriveKey with missing deriveKey usage correctly threw InvalidAccessError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"InvalidAccessError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:104:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:100:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:99:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-CTR length: 192 using empty derivedKey, normal salt, SHA-512, with normal info with wrong (ECDH) key",0,{},{}],["Derived key of type name: AES-CTR length: 256 using empty derivedKey, normal salt, SHA-512, with normal info",1,"assert_unreached: deriveKey failed with error TypeError: Argument 2 of SubtleCrypto.deriveKey is not an object. Reached unreachable code","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:79:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:69:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:68:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-CTR length: 256 using empty derivedKey, normal salt, SHA-512, with normal info with bad hash name SHA512",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"NotSupportedError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-CTR length: 256 using empty derivedKey, normal salt, SHA-512, with normal info with missing deriveKey usage",1,"assert_equals: deriveKey with missing deriveKey usage correctly threw InvalidAccessError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"InvalidAccessError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:104:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:100:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:99:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-CTR length: 256 using empty derivedKey, normal salt, SHA-512, with normal info with wrong (ECDH) key",0,{},{}],["Derived key of type name: AES-GCM length: 128 using empty derivedKey, normal salt, SHA-512, with normal info",1,"assert_unreached: deriveKey failed with error TypeError: Argument 2 of SubtleCrypto.deriveKey is not an object. Reached unreachable code","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:79:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:69:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:68:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-GCM length: 128 using empty derivedKey, normal salt, SHA-512, with normal info with bad hash name SHA512",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"NotSupportedError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-GCM length: 128 using empty derivedKey, normal salt, SHA-512, with normal info with missing deriveKey usage",1,"assert_equals: deriveKey with missing deriveKey usage correctly threw InvalidAccessError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"InvalidAccessError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:104:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:100:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:99:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-GCM length: 128 using empty derivedKey, normal salt, SHA-512, with normal info with wrong (ECDH) key",0,{},{}],["Derived key of type name: AES-GCM length: 192 using empty derivedKey, normal salt, SHA-512, with normal info",1,"assert_unreached: deriveKey failed with error TypeError: Argument 2 of SubtleCrypto.deriveKey is not an object. Reached unreachable code","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:79:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:69:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:68:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-GCM length: 192 using empty derivedKey, normal salt, SHA-512, with normal info with bad hash name SHA512",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"NotSupportedError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-GCM length: 192 using empty derivedKey, normal salt, SHA-512, with normal info with missing deriveKey usage",1,"assert_equals: deriveKey with missing deriveKey usage correctly threw InvalidAccessError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"InvalidAccessError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:104:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:100:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:99:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-GCM length: 192 using empty derivedKey, normal salt, SHA-512, with normal info with wrong (ECDH) key",0,{},{}],["Derived key of type name: AES-GCM length: 256 using empty derivedKey, normal salt, SHA-512, with normal info",1,"assert_unreached: deriveKey failed with error TypeError: Argument 2 of SubtleCrypto.deriveKey is not an object. Reached unreachable code","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:79:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:69:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:68:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-GCM length: 256 using empty derivedKey, normal salt, SHA-512, with normal info with bad hash name SHA512",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"NotSupportedError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-GCM length: 256 using empty derivedKey, normal salt, SHA-512, with normal info with missing deriveKey usage",1,"assert_equals: deriveKey with missing deriveKey usage correctly threw InvalidAccessError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"InvalidAccessError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:104:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:100:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:99:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-GCM length: 256 using empty derivedKey, normal salt, SHA-512, with normal info with wrong (ECDH) key",0,{},{}],["Derived key of type name: AES-KW length: 128 using empty derivedKey, normal salt, SHA-512, with normal info",1,"assert_unreached: deriveKey failed with error TypeError: Argument 2 of SubtleCrypto.deriveKey is not an object. Reached unreachable code","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:79:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:69:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:68:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-KW length: 128 using empty derivedKey, normal salt, SHA-512, with normal info with bad hash name SHA512",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"NotSupportedError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-KW length: 128 using empty derivedKey, normal salt, SHA-512, with normal info with missing deriveKey usage",1,"assert_equals: deriveKey with missing deriveKey usage correctly threw InvalidAccessError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"InvalidAccessError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:104:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:100:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:99:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-KW length: 128 using empty derivedKey, normal salt, SHA-512, with normal info with wrong (ECDH) key",0,{},{}],["Derived key of type name: AES-KW length: 192 using empty derivedKey, normal salt, SHA-512, with normal info",1,"assert_unreached: deriveKey failed with error TypeError: Argument 2 of SubtleCrypto.deriveKey is not an object. Reached unreachable code","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:79:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:69:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:68:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-KW length: 192 using empty derivedKey, normal salt, SHA-512, with normal info with bad hash name SHA512",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"NotSupportedError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-KW length: 192 using empty derivedKey, normal salt, SHA-512, with normal info with missing deriveKey usage",1,"assert_equals: deriveKey with missing deriveKey usage correctly threw InvalidAccessError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"InvalidAccessError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:104:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:100:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:99:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-KW length: 192 using empty derivedKey, normal salt, SHA-512, with normal info with wrong (ECDH) key",0,{},{}],["Derived key of type name: AES-KW length: 256 using empty derivedKey, normal salt, SHA-512, with normal info",1,"assert_unreached: deriveKey failed with error TypeError: Argument 2 of SubtleCrypto.deriveKey is not an object. Reached unreachable code","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:79:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:69:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:68:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-KW length: 256 using empty derivedKey, normal salt, SHA-512, with normal info with bad hash name SHA512",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"NotSupportedError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-KW length: 256 using empty derivedKey, normal salt, SHA-512, with normal info with missing deriveKey usage",1,"assert_equals: deriveKey with missing deriveKey usage correctly threw InvalidAccessError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"InvalidAccessError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:104:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:100:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:99:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-KW length: 256 using empty derivedKey, normal salt, SHA-512, with normal info with wrong (ECDH) key",0,{},{}],["Derived key of type name: HMAC hash: SHA-1 length: 256 using empty derivedKey, normal salt, SHA-512, with normal info",1,"assert_unreached: deriveKey failed with error TypeError: Argument 2 of SubtleCrypto.deriveKey is not an object. Reached unreachable code","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:79:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:69:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:68:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: HMAC hash: SHA-1 length: 256 using empty derivedKey, normal salt, SHA-512, with normal info with bad hash name SHA512",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"NotSupportedError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: HMAC hash: SHA-1 length: 256 using empty derivedKey, normal salt, SHA-512, with normal info with missing deriveKey usage",1,"assert_equals: deriveKey with missing deriveKey usage correctly threw InvalidAccessError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"InvalidAccessError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:104:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:100:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:99:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: HMAC hash: SHA-1 length: 256 using empty derivedKey, normal salt, SHA-512, with normal info with wrong (ECDH) key",0,{},{}],["Derived key of type name: HMAC hash: SHA-256 length: 256 using empty derivedKey, normal salt, SHA-512, with normal info",1,"assert_unreached: deriveKey failed with error TypeError: Argument 2 of SubtleCrypto.deriveKey is not an object. Reached unreachable code","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:79:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:69:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:68:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: HMAC hash: SHA-256 length: 256 using empty derivedKey, normal salt, SHA-512, with normal info with bad hash name SHA512",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"NotSupportedError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: HMAC hash: SHA-256 length: 256 using empty derivedKey, normal salt, SHA-512, with normal info with missing deriveKey usage",1,"assert_equals: deriveKey with missing deriveKey usage correctly threw InvalidAccessError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"InvalidAccessError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:104:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:100:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:99:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: HMAC hash: SHA-256 length: 256 using empty derivedKey, normal salt, SHA-512, with normal info with wrong (ECDH) key",0,{},{}],["Derived key of type name: HMAC hash: SHA-384 length: 256 using empty derivedKey, normal salt, SHA-512, with normal info",1,"assert_unreached: deriveKey failed with error TypeError: Argument 2 of SubtleCrypto.deriveKey is not an object. Reached unreachable code","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:79:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:69:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:68:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: HMAC hash: SHA-384 length: 256 using empty derivedKey, normal salt, SHA-512, with normal info with bad hash name SHA512",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"NotSupportedError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: HMAC hash: SHA-384 length: 256 using empty derivedKey, normal salt, SHA-512, with normal info with missing deriveKey usage",1,"assert_equals: deriveKey with missing deriveKey usage correctly threw InvalidAccessError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"InvalidAccessError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:104:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:100:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:99:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: HMAC hash: SHA-384 length: 256 using empty derivedKey, normal salt, SHA-512, with normal info with wrong (ECDH) key",0,{},{}],["Derived key of type name: HMAC hash: SHA-512 length: 256 using empty derivedKey, normal salt, SHA-512, with normal info",1,"assert_unreached: deriveKey failed with error TypeError: Argument 2 of SubtleCrypto.deriveKey is not an object. Reached unreachable code","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:79:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:69:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:68:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: HMAC hash: SHA-512 length: 256 using empty derivedKey, normal salt, SHA-512, with normal info with bad hash name SHA512",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"NotSupportedError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: HMAC hash: SHA-512 length: 256 using empty derivedKey, normal salt, SHA-512, with normal info with missing deriveKey usage",1,"assert_equals: deriveKey with missing deriveKey usage correctly threw InvalidAccessError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"InvalidAccessError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:104:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:100:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:99:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: HMAC hash: SHA-512 length: 256 using empty derivedKey, normal salt, SHA-512, with normal info with wrong (ECDH) key",0,{},{}],["empty derivedKey, normal salt, SHA-512, with normal info with missing salt",0,{},{}],["empty derivedKey, normal salt, SHA-512, with normal info with missing info",0,{},{}],["empty derivedKey, normal salt, SHA-512, with normal info with null length",0,{},{}],["empty derivedKey, normal salt, SHA-512, with normal info with non-multiple of 8 length",1,"assert_equals: deriveBits with non-multiple of 8 length correctly threw OperationError: Argument 2 of SubtleCrypto.deriveBits is not an object. expected \"OperationError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:158:33\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:154:36\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:153:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["empty derivedKey, normal salt, SHA-512, with normal info with bad hash name SHA512",1,"assert_equals: deriveBits with bad hash name correctly threw NotSupportedError: Argument 2 of SubtleCrypto.deriveBits is not an object. expected \"NotSupportedError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:170:33\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:166:36\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:164:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["empty derivedKey, normal salt, SHA-512, with normal info with missing deriveBits usage",1,"assert_equals: deriveBits with missing deriveBits usage correctly threw InvalidAccessError: Argument 2 of SubtleCrypto.deriveBits is not an object. expected \"InvalidAccessError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:180:33\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:176:36\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:175:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["empty derivedKey, normal salt, SHA-512, with normal info with wrong (ECDH) key",0,{},{}],["empty derivedKey, normal salt, SHA-512, with empty info",1,"assert_unreached: deriveBits failed with error TypeError: Argument 2 of SubtleCrypto.deriveBits is not an object. Reached unreachable code","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:44:33\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:40:36\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:39:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["empty derivedKey, normal salt, SHA-512, with empty info with 0 length",1,"assert_equals: deriveBits with 0 length correctly threw OperationError: Argument 2 of SubtleCrypto.deriveBits is not an object. expected \"OperationError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:54:33\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:50:36\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:49:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-CBC length: 128 using empty derivedKey, normal salt, SHA-512, with empty info",1,"assert_unreached: deriveKey failed with error TypeError: Argument 2 of SubtleCrypto.deriveKey is not an object. Reached unreachable code","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:79:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:69:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:68:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-CBC length: 128 using empty derivedKey, normal salt, SHA-512, with empty info with bad hash name SHA512",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"NotSupportedError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-CBC length: 128 using empty derivedKey, normal salt, SHA-512, with empty info with missing deriveKey usage",1,"assert_equals: deriveKey with missing deriveKey usage correctly threw InvalidAccessError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"InvalidAccessError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:104:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:100:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:99:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-CBC length: 128 using empty derivedKey, normal salt, SHA-512, with empty info with wrong (ECDH) key",0,{},{}],["Derived key of type name: AES-CBC length: 192 using empty derivedKey, normal salt, SHA-512, with empty info",1,"assert_unreached: deriveKey failed with error TypeError: Argument 2 of SubtleCrypto.deriveKey is not an object. Reached unreachable code","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:79:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:69:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:68:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-CBC length: 192 using empty derivedKey, normal salt, SHA-512, with empty info with bad hash name SHA512",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"NotSupportedError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-CBC length: 192 using empty derivedKey, normal salt, SHA-512, with empty info with missing deriveKey usage",1,"assert_equals: deriveKey with missing deriveKey usage correctly threw InvalidAccessError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"InvalidAccessError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:104:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:100:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:99:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-CBC length: 192 using empty derivedKey, normal salt, SHA-512, with empty info with wrong (ECDH) key",0,{},{}],["Derived key of type name: AES-CBC length: 256 using empty derivedKey, normal salt, SHA-512, with empty info",1,"assert_unreached: deriveKey failed with error TypeError: Argument 2 of SubtleCrypto.deriveKey is not an object. Reached unreachable code","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:79:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:69:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:68:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-CBC length: 256 using empty derivedKey, normal salt, SHA-512, with empty info with bad hash name SHA512",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"NotSupportedError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-CBC length: 256 using empty derivedKey, normal salt, SHA-512, with empty info with missing deriveKey usage",1,"assert_equals: deriveKey with missing deriveKey usage correctly threw InvalidAccessError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"InvalidAccessError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:104:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:100:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:99:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-CBC length: 256 using empty derivedKey, normal salt, SHA-512, with empty info with wrong (ECDH) key",0,{},{}],["Derived key of type name: AES-CTR length: 128 using empty derivedKey, normal salt, SHA-512, with empty info",1,"assert_unreached: deriveKey failed with error TypeError: Argument 2 of SubtleCrypto.deriveKey is not an object. Reached unreachable code","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:79:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:69:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:68:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-CTR length: 128 using empty derivedKey, normal salt, SHA-512, with empty info with bad hash name SHA512",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"NotSupportedError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-CTR length: 128 using empty derivedKey, normal salt, SHA-512, with empty info with missing deriveKey usage",1,"assert_equals: deriveKey with missing deriveKey usage correctly threw InvalidAccessError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"InvalidAccessError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:104:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:100:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:99:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-CTR length: 128 using empty derivedKey, normal salt, SHA-512, with empty info with wrong (ECDH) key",0,{},{}],["Derived key of type name: AES-CTR length: 192 using empty derivedKey, normal salt, SHA-512, with empty info",1,"assert_unreached: deriveKey failed with error TypeError: Argument 2 of SubtleCrypto.deriveKey is not an object. Reached unreachable code","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:79:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:69:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:68:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-CTR length: 192 using empty derivedKey, normal salt, SHA-512, with empty info with bad hash name SHA512",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"NotSupportedError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-CTR length: 192 using empty derivedKey, normal salt, SHA-512, with empty info with missing deriveKey usage",1,"assert_equals: deriveKey with missing deriveKey usage correctly threw InvalidAccessError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"InvalidAccessError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:104:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:100:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:99:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-CTR length: 192 using empty derivedKey, normal salt, SHA-512, with empty info with wrong (ECDH) key",0,{},{}],["Derived key of type name: AES-CTR length: 256 using empty derivedKey, normal salt, SHA-512, with empty info",1,"assert_unreached: deriveKey failed with error TypeError: Argument 2 of SubtleCrypto.deriveKey is not an object. Reached unreachable code","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:79:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:69:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:68:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-CTR length: 256 using empty derivedKey, normal salt, SHA-512, with empty info with bad hash name SHA512",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"NotSupportedError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-CTR length: 256 using empty derivedKey, normal salt, SHA-512, with empty info with missing deriveKey usage",1,"assert_equals: deriveKey with missing deriveKey usage correctly threw InvalidAccessError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"InvalidAccessError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:104:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:100:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:99:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-CTR length: 256 using empty derivedKey, normal salt, SHA-512, with empty info with wrong (ECDH) key",0,{},{}],["Derived key of type name: AES-GCM length: 128 using empty derivedKey, normal salt, SHA-512, with empty info",1,"assert_unreached: deriveKey failed with error TypeError: Argument 2 of SubtleCrypto.deriveKey is not an object. Reached unreachable code","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:79:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:69:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:68:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-GCM length: 128 using empty derivedKey, normal salt, SHA-512, with empty info with bad hash name SHA512",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"NotSupportedError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-GCM length: 128 using empty derivedKey, normal salt, SHA-512, with empty info with missing deriveKey usage",1,"assert_equals: deriveKey with missing deriveKey usage correctly threw InvalidAccessError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"InvalidAccessError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:104:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:100:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:99:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-GCM length: 128 using empty derivedKey, normal salt, SHA-512, with empty info with wrong (ECDH) key",0,{},{}],["Derived key of type name: AES-GCM length: 192 using empty derivedKey, normal salt, SHA-512, with empty info",1,"assert_unreached: deriveKey failed with error TypeError: Argument 2 of SubtleCrypto.deriveKey is not an object. Reached unreachable code","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:79:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:69:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:68:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-GCM length: 192 using empty derivedKey, normal salt, SHA-512, with empty info with bad hash name SHA512",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"NotSupportedError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-GCM length: 192 using empty derivedKey, normal salt, SHA-512, with empty info with missing deriveKey usage",1,"assert_equals: deriveKey with missing deriveKey usage correctly threw InvalidAccessError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"InvalidAccessError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:104:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:100:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:99:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-GCM length: 192 using empty derivedKey, normal salt, SHA-512, with empty info with wrong (ECDH) key",0,{},{}],["Derived key of type name: AES-GCM length: 256 using empty derivedKey, normal salt, SHA-512, with empty info",1,"assert_unreached: deriveKey failed with error TypeError: Argument 2 of SubtleCrypto.deriveKey is not an object. Reached unreachable code","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:79:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:69:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:68:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-GCM length: 256 using empty derivedKey, normal salt, SHA-512, with empty info with bad hash name SHA512",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"NotSupportedError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-GCM length: 256 using empty derivedKey, normal salt, SHA-512, with empty info with missing deriveKey usage",1,"assert_equals: deriveKey with missing deriveKey usage correctly threw InvalidAccessError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"InvalidAccessError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:104:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:100:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:99:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-GCM length: 256 using empty derivedKey, normal salt, SHA-512, with empty info with wrong (ECDH) key",0,{},{}],["Derived key of type name: AES-KW length: 128 using empty derivedKey, normal salt, SHA-512, with empty info",1,"assert_unreached: deriveKey failed with error TypeError: Argument 2 of SubtleCrypto.deriveKey is not an object. Reached unreachable code","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:79:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:69:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:68:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-KW length: 128 using empty derivedKey, normal salt, SHA-512, with empty info with bad hash name SHA512",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"NotSupportedError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-KW length: 128 using empty derivedKey, normal salt, SHA-512, with empty info with missing deriveKey usage",1,"assert_equals: deriveKey with missing deriveKey usage correctly threw InvalidAccessError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"InvalidAccessError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:104:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:100:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:99:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-KW length: 128 using empty derivedKey, normal salt, SHA-512, with empty info with wrong (ECDH) key",0,{},{}],["Derived key of type name: AES-KW length: 192 using empty derivedKey, normal salt, SHA-512, with empty info",1,"assert_unreached: deriveKey failed with error TypeError: Argument 2 of SubtleCrypto.deriveKey is not an object. Reached unreachable code","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:79:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:69:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:68:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-KW length: 192 using empty derivedKey, normal salt, SHA-512, with empty info with bad hash name SHA512",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"NotSupportedError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-KW length: 192 using empty derivedKey, normal salt, SHA-512, with empty info with missing deriveKey usage",1,"assert_equals: deriveKey with missing deriveKey usage correctly threw InvalidAccessError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"InvalidAccessError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:104:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:100:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:99:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-KW length: 192 using empty derivedKey, normal salt, SHA-512, with empty info with wrong (ECDH) key",0,{},{}],["Derived key of type name: AES-KW length: 256 using empty derivedKey, normal salt, SHA-512, with empty info",1,"assert_unreached: deriveKey failed with error TypeError: Argument 2 of SubtleCrypto.deriveKey is not an object. Reached unreachable code","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:79:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:69:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:68:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-KW length: 256 using empty derivedKey, normal salt, SHA-512, with empty info with bad hash name SHA512",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"NotSupportedError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-KW length: 256 using empty derivedKey, normal salt, SHA-512, with empty info with missing deriveKey usage",1,"assert_equals: deriveKey with missing deriveKey usage correctly threw InvalidAccessError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"InvalidAccessError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:104:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:100:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:99:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-KW length: 256 using empty derivedKey, normal salt, SHA-512, with empty info with wrong (ECDH) key",0,{},{}],["Derived key of type name: HMAC hash: SHA-1 length: 256 using empty derivedKey, normal salt, SHA-512, with empty info",1,"assert_unreached: deriveKey failed with error TypeError: Argument 2 of SubtleCrypto.deriveKey is not an object. Reached unreachable code","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:79:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:69:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:68:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: HMAC hash: SHA-1 length: 256 using empty derivedKey, normal salt, SHA-512, with empty info with bad hash name SHA512",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"NotSupportedError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: HMAC hash: SHA-1 length: 256 using empty derivedKey, normal salt, SHA-512, with empty info with missing deriveKey usage",1,"assert_equals: deriveKey with missing deriveKey usage correctly threw InvalidAccessError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"InvalidAccessError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:104:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:100:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:99:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: HMAC hash: SHA-1 length: 256 using empty derivedKey, normal salt, SHA-512, with empty info with wrong (ECDH) key",0,{},{}],["Derived key of type name: HMAC hash: SHA-256 length: 256 using empty derivedKey, normal salt, SHA-512, with empty info",1,"assert_unreached: deriveKey failed with error TypeError: Argument 2 of SubtleCrypto.deriveKey is not an object. Reached unreachable code","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:79:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:69:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:68:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: HMAC hash: SHA-256 length: 256 using empty derivedKey, normal salt, SHA-512, with empty info with bad hash name SHA512",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"NotSupportedError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: HMAC hash: SHA-256 length: 256 using empty derivedKey, normal salt, SHA-512, with empty info with missing deriveKey usage",1,"assert_equals: deriveKey with missing deriveKey usage correctly threw InvalidAccessError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"InvalidAccessError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:104:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:100:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:99:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: HMAC hash: SHA-256 length: 256 using empty derivedKey, normal salt, SHA-512, with empty info with wrong (ECDH) key",0,{},{}],["Derived key of type name: HMAC hash: SHA-384 length: 256 using empty derivedKey, normal salt, SHA-512, with empty info",1,"assert_unreached: deriveKey failed with error TypeError: Argument 2 of SubtleCrypto.deriveKey is not an object. Reached unreachable code","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:79:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:69:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:68:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: HMAC hash: SHA-384 length: 256 using empty derivedKey, normal salt, SHA-512, with empty info with bad hash name SHA512",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"NotSupportedError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: HMAC hash: SHA-384 length: 256 using empty derivedKey, normal salt, SHA-512, with empty info with missing deriveKey usage",1,"assert_equals: deriveKey with missing deriveKey usage correctly threw InvalidAccessError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"InvalidAccessError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:104:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:100:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:99:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: HMAC hash: SHA-384 length: 256 using empty derivedKey, normal salt, SHA-512, with empty info with wrong (ECDH) key",0,{},{}],["Derived key of type name: HMAC hash: SHA-512 length: 256 using empty derivedKey, normal salt, SHA-512, with empty info",1,"assert_unreached: deriveKey failed with error TypeError: Argument 2 of SubtleCrypto.deriveKey is not an object. Reached unreachable code","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:79:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:69:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:68:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: HMAC hash: SHA-512 length: 256 using empty derivedKey, normal salt, SHA-512, with empty info with bad hash name SHA512",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"NotSupportedError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: HMAC hash: SHA-512 length: 256 using empty derivedKey, normal salt, SHA-512, with empty info with missing deriveKey usage",1,"assert_equals: deriveKey with missing deriveKey usage correctly threw InvalidAccessError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"InvalidAccessError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:104:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:100:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:99:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: HMAC hash: SHA-512 length: 256 using empty derivedKey, normal salt, SHA-512, with empty info with wrong (ECDH) key",0,{},{}],["empty derivedKey, normal salt, SHA-512, with empty info with missing salt",0,{},{}],["empty derivedKey, normal salt, SHA-512, with empty info with missing info",0,{},{}],["empty derivedKey, normal salt, SHA-512, with empty info with null length",0,{},{}],["empty derivedKey, normal salt, SHA-512, with empty info with non-multiple of 8 length",1,"assert_equals: deriveBits with non-multiple of 8 length correctly threw OperationError: Argument 2 of SubtleCrypto.deriveBits is not an object. expected \"OperationError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:158:33\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:154:36\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:153:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["empty derivedKey, normal salt, SHA-512, with empty info with bad hash name SHA512",1,"assert_equals: deriveBits with bad hash name correctly threw NotSupportedError: Argument 2 of SubtleCrypto.deriveBits is not an object. expected \"NotSupportedError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:170:33\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:166:36\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:164:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["empty derivedKey, normal salt, SHA-512, with empty info with missing deriveBits usage",1,"assert_equals: deriveBits with missing deriveBits usage correctly threw InvalidAccessError: Argument 2 of SubtleCrypto.deriveBits is not an object. expected \"InvalidAccessError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:180:33\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:176:36\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:175:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["empty derivedKey, normal salt, SHA-512, with empty info with wrong (ECDH) key",0,{},{}],["empty derivedKey, normal salt, SHA-1, with normal info",1,"assert_unreached: deriveBits failed with error TypeError: Argument 2 of SubtleCrypto.deriveBits is not an object. Reached unreachable code","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:44:33\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:40:36\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:39:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["empty derivedKey, normal salt, SHA-1, with normal info with 0 length",1,"assert_equals: deriveBits with 0 length correctly threw OperationError: Argument 2 of SubtleCrypto.deriveBits is not an object. expected \"OperationError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:54:33\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:50:36\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:49:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-CBC length: 128 using empty derivedKey, normal salt, SHA-1, with normal info",1,"assert_unreached: deriveKey failed with error TypeError: Argument 2 of SubtleCrypto.deriveKey is not an object. Reached unreachable code","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:79:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:69:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:68:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-CBC length: 128 using empty derivedKey, normal salt, SHA-1, with normal info with bad hash name SHA1",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"NotSupportedError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-CBC length: 128 using empty derivedKey, normal salt, SHA-1, with normal info with missing deriveKey usage",1,"assert_equals: deriveKey with missing deriveKey usage correctly threw InvalidAccessError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"InvalidAccessError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:104:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:100:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:99:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-CBC length: 128 using empty derivedKey, normal salt, SHA-1, with normal info with wrong (ECDH) key",0,{},{}],["Derived key of type name: AES-CBC length: 192 using empty derivedKey, normal salt, SHA-1, with normal info",1,"assert_unreached: deriveKey failed with error TypeError: Argument 2 of SubtleCrypto.deriveKey is not an object. Reached unreachable code","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:79:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:69:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:68:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-CBC length: 192 using empty derivedKey, normal salt, SHA-1, with normal info with bad hash name SHA1",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"NotSupportedError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-CBC length: 192 using empty derivedKey, normal salt, SHA-1, with normal info with missing deriveKey usage",1,"assert_equals: deriveKey with missing deriveKey usage correctly threw InvalidAccessError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"InvalidAccessError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:104:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:100:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:99:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-CBC length: 192 using empty derivedKey, normal salt, SHA-1, with normal info with wrong (ECDH) key",0,{},{}],["Derived key of type name: AES-CBC length: 256 using empty derivedKey, normal salt, SHA-1, with normal info",1,"assert_unreached: deriveKey failed with error TypeError: Argument 2 of SubtleCrypto.deriveKey is not an object. Reached unreachable code","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:79:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:69:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:68:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-CBC length: 256 using empty derivedKey, normal salt, SHA-1, with normal info with bad hash name SHA1",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"NotSupportedError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-CBC length: 256 using empty derivedKey, normal salt, SHA-1, with normal info with missing deriveKey usage",1,"assert_equals: deriveKey with missing deriveKey usage correctly threw InvalidAccessError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"InvalidAccessError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:104:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:100:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:99:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-CBC length: 256 using empty derivedKey, normal salt, SHA-1, with normal info with wrong (ECDH) key",0,{},{}],["Derived key of type name: AES-CTR length: 128 using empty derivedKey, normal salt, SHA-1, with normal info",1,"assert_unreached: deriveKey failed with error TypeError: Argument 2 of SubtleCrypto.deriveKey is not an object. Reached unreachable code","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:79:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:69:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:68:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-CTR length: 128 using empty derivedKey, normal salt, SHA-1, with normal info with bad hash name SHA1",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"NotSupportedError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-CTR length: 128 using empty derivedKey, normal salt, SHA-1, with normal info with missing deriveKey usage",1,"assert_equals: deriveKey with missing deriveKey usage correctly threw InvalidAccessError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"InvalidAccessError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:104:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:100:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:99:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-CTR length: 128 using empty derivedKey, normal salt, SHA-1, with normal info with wrong (ECDH) key",0,{},{}],["Derived key of type name: AES-CTR length: 192 using empty derivedKey, normal salt, SHA-1, with normal info",1,"assert_unreached: deriveKey failed with error TypeError: Argument 2 of SubtleCrypto.deriveKey is not an object. Reached unreachable code","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:79:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:69:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:68:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-CTR length: 192 using empty derivedKey, normal salt, SHA-1, with normal info with bad hash name SHA1",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"NotSupportedError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-CTR length: 192 using empty derivedKey, normal salt, SHA-1, with normal info with missing deriveKey usage",1,"assert_equals: deriveKey with missing deriveKey usage correctly threw InvalidAccessError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"InvalidAccessError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:104:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:100:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:99:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-CTR length: 192 using empty derivedKey, normal salt, SHA-1, with normal info with wrong (ECDH) key",0,{},{}],["Derived key of type name: AES-CTR length: 256 using empty derivedKey, normal salt, SHA-1, with normal info",1,"assert_unreached: deriveKey failed with error TypeError: Argument 2 of SubtleCrypto.deriveKey is not an object. Reached unreachable code","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:79:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:69:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:68:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-CTR length: 256 using empty derivedKey, normal salt, SHA-1, with normal info with bad hash name SHA1",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"NotSupportedError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-CTR length: 256 using empty derivedKey, normal salt, SHA-1, with normal info with missing deriveKey usage",1,"assert_equals: deriveKey with missing deriveKey usage correctly threw InvalidAccessError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"InvalidAccessError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:104:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:100:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:99:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-CTR length: 256 using empty derivedKey, normal salt, SHA-1, with normal info with wrong (ECDH) key",0,{},{}],["Derived key of type name: AES-GCM length: 128 using empty derivedKey, normal salt, SHA-1, with normal info",1,"assert_unreached: deriveKey failed with error TypeError: Argument 2 of SubtleCrypto.deriveKey is not an object. Reached unreachable code","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:79:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:69:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:68:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-GCM length: 128 using empty derivedKey, normal salt, SHA-1, with normal info with bad hash name SHA1",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"NotSupportedError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-GCM length: 128 using empty derivedKey, normal salt, SHA-1, with normal info with missing deriveKey usage",1,"assert_equals: deriveKey with missing deriveKey usage correctly threw InvalidAccessError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"InvalidAccessError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:104:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:100:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:99:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-GCM length: 128 using empty derivedKey, normal salt, SHA-1, with normal info with wrong (ECDH) key",0,{},{}],["Derived key of type name: AES-GCM length: 192 using empty derivedKey, normal salt, SHA-1, with normal info",1,"assert_unreached: deriveKey failed with error TypeError: Argument 2 of SubtleCrypto.deriveKey is not an object. Reached unreachable code","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:79:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:69:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:68:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-GCM length: 192 using empty derivedKey, normal salt, SHA-1, with normal info with bad hash name SHA1",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"NotSupportedError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-GCM length: 192 using empty derivedKey, normal salt, SHA-1, with normal info with missing deriveKey usage",1,"assert_equals: deriveKey with missing deriveKey usage correctly threw InvalidAccessError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"InvalidAccessError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:104:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:100:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:99:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-GCM length: 192 using empty derivedKey, normal salt, SHA-1, with normal info with wrong (ECDH) key",0,{},{}],["Derived key of type name: AES-GCM length: 256 using empty derivedKey, normal salt, SHA-1, with normal info",1,"assert_unreached: deriveKey failed with error TypeError: Argument 2 of SubtleCrypto.deriveKey is not an object. Reached unreachable code","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:79:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:69:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:68:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-GCM length: 256 using empty derivedKey, normal salt, SHA-1, with normal info with bad hash name SHA1",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"NotSupportedError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-GCM length: 256 using empty derivedKey, normal salt, SHA-1, with normal info with missing deriveKey usage",1,"assert_equals: deriveKey with missing deriveKey usage correctly threw InvalidAccessError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"InvalidAccessError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:104:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:100:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:99:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-GCM length: 256 using empty derivedKey, normal salt, SHA-1, with normal info with wrong (ECDH) key",0,{},{}],["Derived key of type name: AES-KW length: 128 using empty derivedKey, normal salt, SHA-1, with normal info",1,"assert_unreached: deriveKey failed with error TypeError: Argument 2 of SubtleCrypto.deriveKey is not an object. Reached unreachable code","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:79:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:69:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:68:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-KW length: 128 using empty derivedKey, normal salt, SHA-1, with normal info with bad hash name SHA1",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"NotSupportedError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-KW length: 128 using empty derivedKey, normal salt, SHA-1, with normal info with missing deriveKey usage",1,"assert_equals: deriveKey with missing deriveKey usage correctly threw InvalidAccessError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"InvalidAccessError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:104:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:100:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:99:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-KW length: 128 using empty derivedKey, normal salt, SHA-1, with normal info with wrong (ECDH) key",0,{},{}],["Derived key of type name: AES-KW length: 192 using empty derivedKey, normal salt, SHA-1, with normal info",1,"assert_unreached: deriveKey failed with error TypeError: Argument 2 of SubtleCrypto.deriveKey is not an object. Reached unreachable code","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:79:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:69:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:68:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-KW length: 192 using empty derivedKey, normal salt, SHA-1, with normal info with bad hash name SHA1",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"NotSupportedError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-KW length: 192 using empty derivedKey, normal salt, SHA-1, with normal info with missing deriveKey usage",1,"assert_equals: deriveKey with missing deriveKey usage correctly threw InvalidAccessError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"InvalidAccessError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:104:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:100:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:99:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-KW length: 192 using empty derivedKey, normal salt, SHA-1, with normal info with wrong (ECDH) key",0,{},{}],["Derived key of type name: AES-KW length: 256 using empty derivedKey, normal salt, SHA-1, with normal info",1,"assert_unreached: deriveKey failed with error TypeError: Argument 2 of SubtleCrypto.deriveKey is not an object. Reached unreachable code","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:79:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:69:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:68:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-KW length: 256 using empty derivedKey, normal salt, SHA-1, with normal info with bad hash name SHA1",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"NotSupportedError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-KW length: 256 using empty derivedKey, normal salt, SHA-1, with normal info with missing deriveKey usage",1,"assert_equals: deriveKey with missing deriveKey usage correctly threw InvalidAccessError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"InvalidAccessError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:104:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:100:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:99:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-KW length: 256 using empty derivedKey, normal salt, SHA-1, with normal info with wrong (ECDH) key",0,{},{}],["Derived key of type name: HMAC hash: SHA-1 length: 256 using empty derivedKey, normal salt, SHA-1, with normal info",1,"assert_unreached: deriveKey failed with error TypeError: Argument 2 of SubtleCrypto.deriveKey is not an object. Reached unreachable code","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:79:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:69:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:68:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: HMAC hash: SHA-1 length: 256 using empty derivedKey, normal salt, SHA-1, with normal info with bad hash name SHA1",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"NotSupportedError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: HMAC hash: SHA-1 length: 256 using empty derivedKey, normal salt, SHA-1, with normal info with missing deriveKey usage",1,"assert_equals: deriveKey with missing deriveKey usage correctly threw InvalidAccessError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"InvalidAccessError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:104:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:100:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:99:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: HMAC hash: SHA-1 length: 256 using empty derivedKey, normal salt, SHA-1, with normal info with wrong (ECDH) key",0,{},{}],["Derived key of type name: HMAC hash: SHA-256 length: 256 using empty derivedKey, normal salt, SHA-1, with normal info",1,"assert_unreached: deriveKey failed with error TypeError: Argument 2 of SubtleCrypto.deriveKey is not an object. Reached unreachable code","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:79:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:69:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:68:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: HMAC hash: SHA-256 length: 256 using empty derivedKey, normal salt, SHA-1, with normal info with bad hash name SHA1",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"NotSupportedError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: HMAC hash: SHA-256 length: 256 using empty derivedKey, normal salt, SHA-1, with normal info with missing deriveKey usage",1,"assert_equals: deriveKey with missing deriveKey usage correctly threw InvalidAccessError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"InvalidAccessError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:104:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:100:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:99:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: HMAC hash: SHA-256 length: 256 using empty derivedKey, normal salt, SHA-1, with normal info with wrong (ECDH) key",0,{},{}],["Derived key of type name: HMAC hash: SHA-384 length: 256 using empty derivedKey, normal salt, SHA-1, with normal info",1,"assert_unreached: deriveKey failed with error TypeError: Argument 2 of SubtleCrypto.deriveKey is not an object. Reached unreachable code","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:79:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:69:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:68:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: HMAC hash: SHA-384 length: 256 using empty derivedKey, normal salt, SHA-1, with normal info with bad hash name SHA1",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"NotSupportedError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: HMAC hash: SHA-384 length: 256 using empty derivedKey, normal salt, SHA-1, with normal info with missing deriveKey usage",1,"assert_equals: deriveKey with missing deriveKey usage correctly threw InvalidAccessError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"InvalidAccessError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:104:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:100:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:99:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: HMAC hash: SHA-384 length: 256 using empty derivedKey, normal salt, SHA-1, with normal info with wrong (ECDH) key",0,{},{}],["Derived key of type name: HMAC hash: SHA-512 length: 256 using empty derivedKey, normal salt, SHA-1, with normal info",1,"assert_unreached: deriveKey failed with error TypeError: Argument 2 of SubtleCrypto.deriveKey is not an object. Reached unreachable code","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:79:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:69:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:68:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: HMAC hash: SHA-512 length: 256 using empty derivedKey, normal salt, SHA-1, with normal info with bad hash name SHA1",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"NotSupportedError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: HMAC hash: SHA-512 length: 256 using empty derivedKey, normal salt, SHA-1, with normal info with missing deriveKey usage",1,"assert_equals: deriveKey with missing deriveKey usage correctly threw InvalidAccessError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"InvalidAccessError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:104:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:100:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:99:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: HMAC hash: SHA-512 length: 256 using empty derivedKey, normal salt, SHA-1, with normal info with wrong (ECDH) key",0,{},{}],["empty derivedKey, normal salt, SHA-1, with normal info with missing salt",0,{},{}],["empty derivedKey, normal salt, SHA-1, with normal info with missing info",0,{},{}],["empty derivedKey, normal salt, SHA-1, with normal info with null length",0,{},{}],["empty derivedKey, normal salt, SHA-1, with normal info with non-multiple of 8 length",1,"assert_equals: deriveBits with non-multiple of 8 length correctly threw OperationError: Argument 2 of SubtleCrypto.deriveBits is not an object. expected \"OperationError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:158:33\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:154:36\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:153:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["empty derivedKey, normal salt, SHA-1, with normal info with bad hash name SHA1",1,"assert_equals: deriveBits with bad hash name correctly threw NotSupportedError: Argument 2 of SubtleCrypto.deriveBits is not an object. expected \"NotSupportedError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:170:33\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:166:36\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:164:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["empty derivedKey, normal salt, SHA-1, with normal info with missing deriveBits usage",1,"assert_equals: deriveBits with missing deriveBits usage correctly threw InvalidAccessError: Argument 2 of SubtleCrypto.deriveBits is not an object. expected \"InvalidAccessError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:180:33\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:176:36\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:175:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["empty derivedKey, normal salt, SHA-1, with normal info with wrong (ECDH) key",0,{},{}],["empty derivedKey, normal salt, SHA-1, with empty info",1,"assert_unreached: deriveBits failed with error TypeError: Argument 2 of SubtleCrypto.deriveBits is not an object. Reached unreachable code","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:44:33\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:40:36\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:39:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["empty derivedKey, normal salt, SHA-1, with empty info with 0 length",1,"assert_equals: deriveBits with 0 length correctly threw OperationError: Argument 2 of SubtleCrypto.deriveBits is not an object. expected \"OperationError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:54:33\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:50:36\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:49:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-CBC length: 128 using empty derivedKey, normal salt, SHA-1, with empty info",1,"assert_unreached: deriveKey failed with error TypeError: Argument 2 of SubtleCrypto.deriveKey is not an object. Reached unreachable code","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:79:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:69:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:68:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-CBC length: 128 using empty derivedKey, normal salt, SHA-1, with empty info with bad hash name SHA1",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"NotSupportedError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-CBC length: 128 using empty derivedKey, normal salt, SHA-1, with empty info with missing deriveKey usage",1,"assert_equals: deriveKey with missing deriveKey usage correctly threw InvalidAccessError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"InvalidAccessError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:104:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:100:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:99:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-CBC length: 128 using empty derivedKey, normal salt, SHA-1, with empty info with wrong (ECDH) key",0,{},{}],["Derived key of type name: AES-CBC length: 192 using empty derivedKey, normal salt, SHA-1, with empty info",1,"assert_unreached: deriveKey failed with error TypeError: Argument 2 of SubtleCrypto.deriveKey is not an object. Reached unreachable code","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:79:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:69:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:68:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-CBC length: 192 using empty derivedKey, normal salt, SHA-1, with empty info with bad hash name SHA1",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"NotSupportedError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-CBC length: 192 using empty derivedKey, normal salt, SHA-1, with empty info with missing deriveKey usage",1,"assert_equals: deriveKey with missing deriveKey usage correctly threw InvalidAccessError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"InvalidAccessError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:104:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:100:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:99:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-CBC length: 192 using empty derivedKey, normal salt, SHA-1, with empty info with wrong (ECDH) key",0,{},{}],["Derived key of type name: AES-CBC length: 256 using empty derivedKey, normal salt, SHA-1, with empty info",1,"assert_unreached: deriveKey failed with error TypeError: Argument 2 of SubtleCrypto.deriveKey is not an object. Reached unreachable code","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:79:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:69:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:68:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-CBC length: 256 using empty derivedKey, normal salt, SHA-1, with empty info with bad hash name SHA1",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"NotSupportedError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-CBC length: 256 using empty derivedKey, normal salt, SHA-1, with empty info with missing deriveKey usage",1,"assert_equals: deriveKey with missing deriveKey usage correctly threw InvalidAccessError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"InvalidAccessError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:104:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:100:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:99:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-CBC length: 256 using empty derivedKey, normal salt, SHA-1, with empty info with wrong (ECDH) key",0,{},{}],["Derived key of type name: AES-CTR length: 128 using empty derivedKey, normal salt, SHA-1, with empty info",1,"assert_unreached: deriveKey failed with error TypeError: Argument 2 of SubtleCrypto.deriveKey is not an object. Reached unreachable code","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:79:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:69:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:68:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-CTR length: 128 using empty derivedKey, normal salt, SHA-1, with empty info with bad hash name SHA1",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"NotSupportedError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-CTR length: 128 using empty derivedKey, normal salt, SHA-1, with empty info with missing deriveKey usage",1,"assert_equals: deriveKey with missing deriveKey usage correctly threw InvalidAccessError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"InvalidAccessError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:104:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:100:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:99:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-CTR length: 128 using empty derivedKey, normal salt, SHA-1, with empty info with wrong (ECDH) key",0,{},{}],["Derived key of type name: AES-CTR length: 192 using empty derivedKey, normal salt, SHA-1, with empty info",1,"assert_unreached: deriveKey failed with error TypeError: Argument 2 of SubtleCrypto.deriveKey is not an object. Reached unreachable code","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:79:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:69:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:68:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-CTR length: 192 using empty derivedKey, normal salt, SHA-1, with empty info with bad hash name SHA1",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"NotSupportedError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-CTR length: 192 using empty derivedKey, normal salt, SHA-1, with empty info with missing deriveKey usage",1,"assert_equals: deriveKey with missing deriveKey usage correctly threw InvalidAccessError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"InvalidAccessError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:104:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:100:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:99:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-CTR length: 192 using empty derivedKey, normal salt, SHA-1, with empty info with wrong (ECDH) key",0,{},{}],["Derived key of type name: AES-CTR length: 256 using empty derivedKey, normal salt, SHA-1, with empty info",1,"assert_unreached: deriveKey failed with error TypeError: Argument 2 of SubtleCrypto.deriveKey is not an object. Reached unreachable code","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:79:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:69:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:68:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-CTR length: 256 using empty derivedKey, normal salt, SHA-1, with empty info with bad hash name SHA1",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"NotSupportedError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-CTR length: 256 using empty derivedKey, normal salt, SHA-1, with empty info with missing deriveKey usage",1,"assert_equals: deriveKey with missing deriveKey usage correctly threw InvalidAccessError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"InvalidAccessError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:104:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:100:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:99:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-CTR length: 256 using empty derivedKey, normal salt, SHA-1, with empty info with wrong (ECDH) key",0,{},{}],["Derived key of type name: AES-GCM length: 128 using empty derivedKey, normal salt, SHA-1, with empty info",1,"assert_unreached: deriveKey failed with error TypeError: Argument 2 of SubtleCrypto.deriveKey is not an object. Reached unreachable code","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:79:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:69:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:68:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-GCM length: 128 using empty derivedKey, normal salt, SHA-1, with empty info with bad hash name SHA1",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"NotSupportedError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-GCM length: 128 using empty derivedKey, normal salt, SHA-1, with empty info with missing deriveKey usage",1,"assert_equals: deriveKey with missing deriveKey usage correctly threw InvalidAccessError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"InvalidAccessError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:104:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:100:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:99:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-GCM length: 128 using empty derivedKey, normal salt, SHA-1, with empty info with wrong (ECDH) key",0,{},{}],["Derived key of type name: AES-GCM length: 192 using empty derivedKey, normal salt, SHA-1, with empty info",1,"assert_unreached: deriveKey failed with error TypeError: Argument 2 of SubtleCrypto.deriveKey is not an object. Reached unreachable code","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:79:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:69:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:68:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-GCM length: 192 using empty derivedKey, normal salt, SHA-1, with empty info with bad hash name SHA1",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"NotSupportedError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-GCM length: 192 using empty derivedKey, normal salt, SHA-1, with empty info with missing deriveKey usage",1,"assert_equals: deriveKey with missing deriveKey usage correctly threw InvalidAccessError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"InvalidAccessError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:104:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:100:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:99:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-GCM length: 192 using empty derivedKey, normal salt, SHA-1, with empty info with wrong (ECDH) key",0,{},{}],["Derived key of type name: AES-GCM length: 256 using empty derivedKey, normal salt, SHA-1, with empty info",1,"assert_unreached: deriveKey failed with error TypeError: Argument 2 of SubtleCrypto.deriveKey is not an object. Reached unreachable code","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:79:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:69:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:68:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-GCM length: 256 using empty derivedKey, normal salt, SHA-1, with empty info with bad hash name SHA1",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"NotSupportedError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-GCM length: 256 using empty derivedKey, normal salt, SHA-1, with empty info with missing deriveKey usage",1,"assert_equals: deriveKey with missing deriveKey usage correctly threw InvalidAccessError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"InvalidAccessError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:104:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:100:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:99:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-GCM length: 256 using empty derivedKey, normal salt, SHA-1, with empty info with wrong (ECDH) key",0,{},{}],["Derived key of type name: AES-KW length: 128 using empty derivedKey, normal salt, SHA-1, with empty info",1,"assert_unreached: deriveKey failed with error TypeError: Argument 2 of SubtleCrypto.deriveKey is not an object. Reached unreachable code","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:79:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:69:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:68:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-KW length: 128 using empty derivedKey, normal salt, SHA-1, with empty info with bad hash name SHA1",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"NotSupportedError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-KW length: 128 using empty derivedKey, normal salt, SHA-1, with empty info with missing deriveKey usage",1,"assert_equals: deriveKey with missing deriveKey usage correctly threw InvalidAccessError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"InvalidAccessError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:104:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:100:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:99:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-KW length: 128 using empty derivedKey, normal salt, SHA-1, with empty info with wrong (ECDH) key",0,{},{}],["Derived key of type name: AES-KW length: 192 using empty derivedKey, normal salt, SHA-1, with empty info",1,"assert_unreached: deriveKey failed with error TypeError: Argument 2 of SubtleCrypto.deriveKey is not an object. Reached unreachable code","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:79:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:69:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:68:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-KW length: 192 using empty derivedKey, normal salt, SHA-1, with empty info with bad hash name SHA1",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"NotSupportedError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-KW length: 192 using empty derivedKey, normal salt, SHA-1, with empty info with missing deriveKey usage",1,"assert_equals: deriveKey with missing deriveKey usage correctly threw InvalidAccessError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"InvalidAccessError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:104:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:100:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:99:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-KW length: 192 using empty derivedKey, normal salt, SHA-1, with empty info with wrong (ECDH) key",0,{},{}],["Derived key of type name: AES-KW length: 256 using empty derivedKey, normal salt, SHA-1, with empty info",1,"assert_unreached: deriveKey failed with error TypeError: Argument 2 of SubtleCrypto.deriveKey is not an object. Reached unreachable code","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:79:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:69:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:68:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-KW length: 256 using empty derivedKey, normal salt, SHA-1, with empty info with bad hash name SHA1",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"NotSupportedError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-KW length: 256 using empty derivedKey, normal salt, SHA-1, with empty info with missing deriveKey usage",1,"assert_equals: deriveKey with missing deriveKey usage correctly threw InvalidAccessError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"InvalidAccessError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:104:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:100:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:99:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-KW length: 256 using empty derivedKey, normal salt, SHA-1, with empty info with wrong (ECDH) key",0,{},{}],["Derived key of type name: HMAC hash: SHA-1 length: 256 using empty derivedKey, normal salt, SHA-1, with empty info",1,"assert_unreached: deriveKey failed with error TypeError: Argument 2 of SubtleCrypto.deriveKey is not an object. Reached unreachable code","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:79:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:69:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:68:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: HMAC hash: SHA-1 length: 256 using empty derivedKey, normal salt, SHA-1, with empty info with bad hash name SHA1",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"NotSupportedError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: HMAC hash: SHA-1 length: 256 using empty derivedKey, normal salt, SHA-1, with empty info with missing deriveKey usage",1,"assert_equals: deriveKey with missing deriveKey usage correctly threw InvalidAccessError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"InvalidAccessError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:104:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:100:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:99:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: HMAC hash: SHA-1 length: 256 using empty derivedKey, normal salt, SHA-1, with empty info with wrong (ECDH) key",0,{},{}],["Derived key of type name: HMAC hash: SHA-256 length: 256 using empty derivedKey, normal salt, SHA-1, with empty info",1,"assert_unreached: deriveKey failed with error TypeError: Argument 2 of SubtleCrypto.deriveKey is not an object. Reached unreachable code","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:79:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:69:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:68:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: HMAC hash: SHA-256 length: 256 using empty derivedKey, normal salt, SHA-1, with empty info with bad hash name SHA1",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"NotSupportedError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: HMAC hash: SHA-256 length: 256 using empty derivedKey, normal salt, SHA-1, with empty info with missing deriveKey usage",1,"assert_equals: deriveKey with missing deriveKey usage correctly threw InvalidAccessError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"InvalidAccessError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:104:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:100:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:99:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: HMAC hash: SHA-256 length: 256 using empty derivedKey, normal salt, SHA-1, with empty info with wrong (ECDH) key",0,{},{}],["Derived key of type name: HMAC hash: SHA-384 length: 256 using empty derivedKey, normal salt, SHA-1, with empty info",1,"assert_unreached: deriveKey failed with error TypeError: Argument 2 of SubtleCrypto.deriveKey is not an object. Reached unreachable code","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:79:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:69:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:68:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: HMAC hash: SHA-384 length: 256 using empty derivedKey, normal salt, SHA-1, with empty info with bad hash name SHA1",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"NotSupportedError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: HMAC hash: SHA-384 length: 256 using empty derivedKey, normal salt, SHA-1, with empty info with missing deriveKey usage",1,"assert_equals: deriveKey with missing deriveKey usage correctly threw InvalidAccessError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"InvalidAccessError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:104:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:100:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:99:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: HMAC hash: SHA-384 length: 256 using empty derivedKey, normal salt, SHA-1, with empty info with wrong (ECDH) key",0,{},{}],["Derived key of type name: HMAC hash: SHA-512 length: 256 using empty derivedKey, normal salt, SHA-1, with empty info",1,"assert_unreached: deriveKey failed with error TypeError: Argument 2 of SubtleCrypto.deriveKey is not an object. Reached unreachable code","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:79:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:69:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:68:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: HMAC hash: SHA-512 length: 256 using empty derivedKey, normal salt, SHA-1, with empty info with bad hash name SHA1",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"NotSupportedError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: HMAC hash: SHA-512 length: 256 using empty derivedKey, normal salt, SHA-1, with empty info with missing deriveKey usage",1,"assert_equals: deriveKey with missing deriveKey usage correctly threw InvalidAccessError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"InvalidAccessError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:104:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:100:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:99:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: HMAC hash: SHA-512 length: 256 using empty derivedKey, normal salt, SHA-1, with empty info with wrong (ECDH) key",0,{},{}],["empty derivedKey, normal salt, SHA-1, with empty info with missing salt",0,{},{}],["empty derivedKey, normal salt, SHA-1, with empty info with missing info",0,{},{}],["empty derivedKey, normal salt, SHA-1, with empty info with null length",0,{},{}],["empty derivedKey, normal salt, SHA-1, with empty info with non-multiple of 8 length",1,"assert_equals: deriveBits with non-multiple of 8 length correctly threw OperationError: Argument 2 of SubtleCrypto.deriveBits is not an object. expected \"OperationError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:158:33\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:154:36\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:153:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["empty derivedKey, normal salt, SHA-1, with empty info with bad hash name SHA1",1,"assert_equals: deriveBits with bad hash name correctly threw NotSupportedError: Argument 2 of SubtleCrypto.deriveBits is not an object. expected \"NotSupportedError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:170:33\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:166:36\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:164:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["empty derivedKey, normal salt, SHA-1, with empty info with missing deriveBits usage",1,"assert_equals: deriveBits with missing deriveBits usage correctly threw InvalidAccessError: Argument 2 of SubtleCrypto.deriveBits is not an object. expected \"InvalidAccessError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:180:33\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:176:36\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:175:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["empty derivedKey, normal salt, SHA-1, with empty info with wrong (ECDH) key",0,{},{}],["empty derivedKey, normal salt, SHA-256, with normal info",1,"assert_unreached: deriveBits failed with error TypeError: Argument 2 of SubtleCrypto.deriveBits is not an object. Reached unreachable code","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:44:33\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:40:36\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:39:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["empty derivedKey, normal salt, SHA-256, with normal info with 0 length",1,"assert_equals: deriveBits with 0 length correctly threw OperationError: Argument 2 of SubtleCrypto.deriveBits is not an object. expected \"OperationError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:54:33\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:50:36\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:49:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-CBC length: 128 using empty derivedKey, normal salt, SHA-256, with normal info",1,"assert_unreached: deriveKey failed with error TypeError: Argument 2 of SubtleCrypto.deriveKey is not an object. Reached unreachable code","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:79:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:69:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:68:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-CBC length: 128 using empty derivedKey, normal salt, SHA-256, with normal info with bad hash name SHA256",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"NotSupportedError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-CBC length: 128 using empty derivedKey, normal salt, SHA-256, with normal info with missing deriveKey usage",1,"assert_equals: deriveKey with missing deriveKey usage correctly threw InvalidAccessError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"InvalidAccessError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:104:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:100:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:99:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-CBC length: 128 using empty derivedKey, normal salt, SHA-256, with normal info with wrong (ECDH) key",0,{},{}],["Derived key of type name: AES-CBC length: 192 using empty derivedKey, normal salt, SHA-256, with normal info",1,"assert_unreached: deriveKey failed with error TypeError: Argument 2 of SubtleCrypto.deriveKey is not an object. Reached unreachable code","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:79:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:69:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:68:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-CBC length: 192 using empty derivedKey, normal salt, SHA-256, with normal info with bad hash name SHA256",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"NotSupportedError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-CBC length: 192 using empty derivedKey, normal salt, SHA-256, with normal info with missing deriveKey usage",1,"assert_equals: deriveKey with missing deriveKey usage correctly threw InvalidAccessError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"InvalidAccessError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:104:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:100:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:99:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-CBC length: 192 using empty derivedKey, normal salt, SHA-256, with normal info with wrong (ECDH) key",0,{},{}],["Derived key of type name: AES-CBC length: 256 using empty derivedKey, normal salt, SHA-256, with normal info",1,"assert_unreached: deriveKey failed with error TypeError: Argument 2 of SubtleCrypto.deriveKey is not an object. Reached unreachable code","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:79:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:69:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:68:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-CBC length: 256 using empty derivedKey, normal salt, SHA-256, with normal info with bad hash name SHA256",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"NotSupportedError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-CBC length: 256 using empty derivedKey, normal salt, SHA-256, with normal info with missing deriveKey usage",1,"assert_equals: deriveKey with missing deriveKey usage correctly threw InvalidAccessError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"InvalidAccessError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:104:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:100:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:99:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-CBC length: 256 using empty derivedKey, normal salt, SHA-256, with normal info with wrong (ECDH) key",0,{},{}],["Derived key of type name: AES-CTR length: 128 using empty derivedKey, normal salt, SHA-256, with normal info",1,"assert_unreached: deriveKey failed with error TypeError: Argument 2 of SubtleCrypto.deriveKey is not an object. Reached unreachable code","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:79:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:69:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:68:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-CTR length: 128 using empty derivedKey, normal salt, SHA-256, with normal info with bad hash name SHA256",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"NotSupportedError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-CTR length: 128 using empty derivedKey, normal salt, SHA-256, with normal info with missing deriveKey usage",1,"assert_equals: deriveKey with missing deriveKey usage correctly threw InvalidAccessError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"InvalidAccessError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:104:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:100:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:99:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-CTR length: 128 using empty derivedKey, normal salt, SHA-256, with normal info with wrong (ECDH) key",0,{},{}],["Derived key of type name: AES-CTR length: 192 using empty derivedKey, normal salt, SHA-256, with normal info",1,"assert_unreached: deriveKey failed with error TypeError: Argument 2 of SubtleCrypto.deriveKey is not an object. Reached unreachable code","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:79:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:69:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:68:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-CTR length: 192 using empty derivedKey, normal salt, SHA-256, with normal info with bad hash name SHA256",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"NotSupportedError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-CTR length: 192 using empty derivedKey, normal salt, SHA-256, with normal info with missing deriveKey usage",1,"assert_equals: deriveKey with missing deriveKey usage correctly threw InvalidAccessError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"InvalidAccessError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:104:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:100:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:99:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-CTR length: 192 using empty derivedKey, normal salt, SHA-256, with normal info with wrong (ECDH) key",0,{},{}],["Derived key of type name: AES-CTR length: 256 using empty derivedKey, normal salt, SHA-256, with normal info",1,"assert_unreached: deriveKey failed with error TypeError: Argument 2 of SubtleCrypto.deriveKey is not an object. Reached unreachable code","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:79:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:69:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:68:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-CTR length: 256 using empty derivedKey, normal salt, SHA-256, with normal info with bad hash name SHA256",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"NotSupportedError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-CTR length: 256 using empty derivedKey, normal salt, SHA-256, with normal info with missing deriveKey usage",1,"assert_equals: deriveKey with missing deriveKey usage correctly threw InvalidAccessError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"InvalidAccessError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:104:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:100:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:99:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-CTR length: 256 using empty derivedKey, normal salt, SHA-256, with normal info with wrong (ECDH) key",0,{},{}],["Derived key of type name: AES-GCM length: 128 using empty derivedKey, normal salt, SHA-256, with normal info",1,"assert_unreached: deriveKey failed with error TypeError: Argument 2 of SubtleCrypto.deriveKey is not an object. Reached unreachable code","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:79:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:69:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:68:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-GCM length: 128 using empty derivedKey, normal salt, SHA-256, with normal info with bad hash name SHA256",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"NotSupportedError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-GCM length: 128 using empty derivedKey, normal salt, SHA-256, with normal info with missing deriveKey usage",1,"assert_equals: deriveKey with missing deriveKey usage correctly threw InvalidAccessError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"InvalidAccessError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:104:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:100:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:99:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-GCM length: 128 using empty derivedKey, normal salt, SHA-256, with normal info with wrong (ECDH) key",0,{},{}],["Derived key of type name: AES-GCM length: 192 using empty derivedKey, normal salt, SHA-256, with normal info",1,"assert_unreached: deriveKey failed with error TypeError: Argument 2 of SubtleCrypto.deriveKey is not an object. Reached unreachable code","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:79:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:69:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:68:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-GCM length: 192 using empty derivedKey, normal salt, SHA-256, with normal info with bad hash name SHA256",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"NotSupportedError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-GCM length: 192 using empty derivedKey, normal salt, SHA-256, with normal info with missing deriveKey usage",1,"assert_equals: deriveKey with missing deriveKey usage correctly threw InvalidAccessError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"InvalidAccessError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:104:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:100:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:99:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-GCM length: 192 using empty derivedKey, normal salt, SHA-256, with normal info with wrong (ECDH) key",0,{},{}],["Derived key of type name: AES-GCM length: 256 using empty derivedKey, normal salt, SHA-256, with normal info",1,"assert_unreached: deriveKey failed with error TypeError: Argument 2 of SubtleCrypto.deriveKey is not an object. Reached unreachable code","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:79:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:69:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:68:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-GCM length: 256 using empty derivedKey, normal salt, SHA-256, with normal info with bad hash name SHA256",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"NotSupportedError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-GCM length: 256 using empty derivedKey, normal salt, SHA-256, with normal info with missing deriveKey usage",1,"assert_equals: deriveKey with missing deriveKey usage correctly threw InvalidAccessError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"InvalidAccessError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:104:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:100:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:99:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-GCM length: 256 using empty derivedKey, normal salt, SHA-256, with normal info with wrong (ECDH) key",0,{},{}],["Derived key of type name: AES-KW length: 128 using empty derivedKey, normal salt, SHA-256, with normal info",1,"assert_unreached: deriveKey failed with error TypeError: Argument 2 of SubtleCrypto.deriveKey is not an object. Reached unreachable code","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:79:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:69:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:68:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-KW length: 128 using empty derivedKey, normal salt, SHA-256, with normal info with bad hash name SHA256",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"NotSupportedError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-KW length: 128 using empty derivedKey, normal salt, SHA-256, with normal info with missing deriveKey usage",1,"assert_equals: deriveKey with missing deriveKey usage correctly threw InvalidAccessError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"InvalidAccessError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:104:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:100:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:99:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-KW length: 128 using empty derivedKey, normal salt, SHA-256, with normal info with wrong (ECDH) key",0,{},{}],["Derived key of type name: AES-KW length: 192 using empty derivedKey, normal salt, SHA-256, with normal info",1,"assert_unreached: deriveKey failed with error TypeError: Argument 2 of SubtleCrypto.deriveKey is not an object. Reached unreachable code","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:79:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:69:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:68:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-KW length: 192 using empty derivedKey, normal salt, SHA-256, with normal info with bad hash name SHA256",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"NotSupportedError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-KW length: 192 using empty derivedKey, normal salt, SHA-256, with normal info with missing deriveKey usage",1,"assert_equals: deriveKey with missing deriveKey usage correctly threw InvalidAccessError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"InvalidAccessError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:104:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:100:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:99:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-KW length: 192 using empty derivedKey, normal salt, SHA-256, with normal info with wrong (ECDH) key",0,{},{}],["Derived key of type name: AES-KW length: 256 using empty derivedKey, normal salt, SHA-256, with normal info",1,"assert_unreached: deriveKey failed with error TypeError: Argument 2 of SubtleCrypto.deriveKey is not an object. Reached unreachable code","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:79:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:69:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:68:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-KW length: 256 using empty derivedKey, normal salt, SHA-256, with normal info with bad hash name SHA256",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"NotSupportedError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-KW length: 256 using empty derivedKey, normal salt, SHA-256, with normal info with missing deriveKey usage",1,"assert_equals: deriveKey with missing deriveKey usage correctly threw InvalidAccessError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"InvalidAccessError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:104:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:100:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:99:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-KW length: 256 using empty derivedKey, normal salt, SHA-256, with normal info with wrong (ECDH) key",0,{},{}],["Derived key of type name: HMAC hash: SHA-1 length: 256 using empty derivedKey, normal salt, SHA-256, with normal info",1,"assert_unreached: deriveKey failed with error TypeError: Argument 2 of SubtleCrypto.deriveKey is not an object. Reached unreachable code","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:79:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:69:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:68:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: HMAC hash: SHA-1 length: 256 using empty derivedKey, normal salt, SHA-256, with normal info with bad hash name SHA256",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"NotSupportedError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: HMAC hash: SHA-1 length: 256 using empty derivedKey, normal salt, SHA-256, with normal info with missing deriveKey usage",1,"assert_equals: deriveKey with missing deriveKey usage correctly threw InvalidAccessError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"InvalidAccessError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:104:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:100:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:99:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: HMAC hash: SHA-1 length: 256 using empty derivedKey, normal salt, SHA-256, with normal info with wrong (ECDH) key",0,{},{}],["Derived key of type name: HMAC hash: SHA-256 length: 256 using empty derivedKey, normal salt, SHA-256, with normal info",1,"assert_unreached: deriveKey failed with error TypeError: Argument 2 of SubtleCrypto.deriveKey is not an object. Reached unreachable code","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:79:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:69:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:68:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: HMAC hash: SHA-256 length: 256 using empty derivedKey, normal salt, SHA-256, with normal info with bad hash name SHA256",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"NotSupportedError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: HMAC hash: SHA-256 length: 256 using empty derivedKey, normal salt, SHA-256, with normal info with missing deriveKey usage",1,"assert_equals: deriveKey with missing deriveKey usage correctly threw InvalidAccessError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"InvalidAccessError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:104:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:100:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:99:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: HMAC hash: SHA-256 length: 256 using empty derivedKey, normal salt, SHA-256, with normal info with wrong (ECDH) key",0,{},{}],["Derived key of type name: HMAC hash: SHA-384 length: 256 using empty derivedKey, normal salt, SHA-256, with normal info",1,"assert_unreached: deriveKey failed with error TypeError: Argument 2 of SubtleCrypto.deriveKey is not an object. Reached unreachable code","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:79:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:69:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:68:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: HMAC hash: SHA-384 length: 256 using empty derivedKey, normal salt, SHA-256, with normal info with bad hash name SHA256",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"NotSupportedError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: HMAC hash: SHA-384 length: 256 using empty derivedKey, normal salt, SHA-256, with normal info with missing deriveKey usage",1,"assert_equals: deriveKey with missing deriveKey usage correctly threw InvalidAccessError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"InvalidAccessError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:104:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:100:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:99:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: HMAC hash: SHA-384 length: 256 using empty derivedKey, normal salt, SHA-256, with normal info with wrong (ECDH) key",0,{},{}],["Derived key of type name: HMAC hash: SHA-512 length: 256 using empty derivedKey, normal salt, SHA-256, with normal info",1,"assert_unreached: deriveKey failed with error TypeError: Argument 2 of SubtleCrypto.deriveKey is not an object. Reached unreachable code","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:79:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:69:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:68:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: HMAC hash: SHA-512 length: 256 using empty derivedKey, normal salt, SHA-256, with normal info with bad hash name SHA256",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"NotSupportedError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: HMAC hash: SHA-512 length: 256 using empty derivedKey, normal salt, SHA-256, with normal info with missing deriveKey usage",1,"assert_equals: deriveKey with missing deriveKey usage correctly threw InvalidAccessError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"InvalidAccessError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:104:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:100:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:99:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: HMAC hash: SHA-512 length: 256 using empty derivedKey, normal salt, SHA-256, with normal info with wrong (ECDH) key",0,{},{}],["empty derivedKey, normal salt, SHA-256, with normal info with missing salt",0,{},{}],["empty derivedKey, normal salt, SHA-256, with normal info with missing info",0,{},{}],["empty derivedKey, normal salt, SHA-256, with normal info with null length",0,{},{}],["empty derivedKey, normal salt, SHA-256, with normal info with non-multiple of 8 length",1,"assert_equals: deriveBits with non-multiple of 8 length correctly threw OperationError: Argument 2 of SubtleCrypto.deriveBits is not an object. expected \"OperationError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:158:33\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:154:36\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:153:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["empty derivedKey, normal salt, SHA-256, with normal info with bad hash name SHA256",1,"assert_equals: deriveBits with bad hash name correctly threw NotSupportedError: Argument 2 of SubtleCrypto.deriveBits is not an object. expected \"NotSupportedError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:170:33\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:166:36\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:164:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["empty derivedKey, normal salt, SHA-256, with normal info with missing deriveBits usage",1,"assert_equals: deriveBits with missing deriveBits usage correctly threw InvalidAccessError: Argument 2 of SubtleCrypto.deriveBits is not an object. expected \"InvalidAccessError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:180:33\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:176:36\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:175:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["empty derivedKey, normal salt, SHA-256, with normal info with wrong (ECDH) key",0,{},{}],["empty derivedKey, normal salt, SHA-256, with empty info",1,"assert_unreached: deriveBits failed with error TypeError: Argument 2 of SubtleCrypto.deriveBits is not an object. Reached unreachable code","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:44:33\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:40:36\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:39:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["empty derivedKey, normal salt, SHA-256, with empty info with 0 length",1,"assert_equals: deriveBits with 0 length correctly threw OperationError: Argument 2 of SubtleCrypto.deriveBits is not an object. expected \"OperationError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:54:33\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:50:36\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:49:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-CBC length: 128 using empty derivedKey, normal salt, SHA-256, with empty info",1,"assert_unreached: deriveKey failed with error TypeError: Argument 2 of SubtleCrypto.deriveKey is not an object. Reached unreachable code","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:79:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:69:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:68:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-CBC length: 128 using empty derivedKey, normal salt, SHA-256, with empty info with bad hash name SHA256",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"NotSupportedError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-CBC length: 128 using empty derivedKey, normal salt, SHA-256, with empty info with missing deriveKey usage",1,"assert_equals: deriveKey with missing deriveKey usage correctly threw InvalidAccessError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"InvalidAccessError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:104:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:100:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:99:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-CBC length: 128 using empty derivedKey, normal salt, SHA-256, with empty info with wrong (ECDH) key",0,{},{}],["Derived key of type name: AES-CBC length: 192 using empty derivedKey, normal salt, SHA-256, with empty info",1,"assert_unreached: deriveKey failed with error TypeError: Argument 2 of SubtleCrypto.deriveKey is not an object. Reached unreachable code","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:79:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:69:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:68:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-CBC length: 192 using empty derivedKey, normal salt, SHA-256, with empty info with bad hash name SHA256",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"NotSupportedError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-CBC length: 192 using empty derivedKey, normal salt, SHA-256, with empty info with missing deriveKey usage",1,"assert_equals: deriveKey with missing deriveKey usage correctly threw InvalidAccessError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"InvalidAccessError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:104:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:100:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:99:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-CBC length: 192 using empty derivedKey, normal salt, SHA-256, with empty info with wrong (ECDH) key",0,{},{}],["Derived key of type name: AES-CBC length: 256 using empty derivedKey, normal salt, SHA-256, with empty info",1,"assert_unreached: deriveKey failed with error TypeError: Argument 2 of SubtleCrypto.deriveKey is not an object. Reached unreachable code","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:79:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:69:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:68:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-CBC length: 256 using empty derivedKey, normal salt, SHA-256, with empty info with bad hash name SHA256",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"NotSupportedError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-CBC length: 256 using empty derivedKey, normal salt, SHA-256, with empty info with missing deriveKey usage",1,"assert_equals: deriveKey with missing deriveKey usage correctly threw InvalidAccessError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"InvalidAccessError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:104:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:100:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:99:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-CBC length: 256 using empty derivedKey, normal salt, SHA-256, with empty info with wrong (ECDH) key",0,{},{}],["Derived key of type name: AES-CTR length: 128 using empty derivedKey, normal salt, SHA-256, with empty info",1,"assert_unreached: deriveKey failed with error TypeError: Argument 2 of SubtleCrypto.deriveKey is not an object. Reached unreachable code","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:79:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:69:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:68:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-CTR length: 128 using empty derivedKey, normal salt, SHA-256, with empty info with bad hash name SHA256",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"NotSupportedError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-CTR length: 128 using empty derivedKey, normal salt, SHA-256, with empty info with missing deriveKey usage",1,"assert_equals: deriveKey with missing deriveKey usage correctly threw InvalidAccessError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"InvalidAccessError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:104:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:100:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:99:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-CTR length: 128 using empty derivedKey, normal salt, SHA-256, with empty info with wrong (ECDH) key",0,{},{}],["Derived key of type name: AES-CTR length: 192 using empty derivedKey, normal salt, SHA-256, with empty info",1,"assert_unreached: deriveKey failed with error TypeError: Argument 2 of SubtleCrypto.deriveKey is not an object. Reached unreachable code","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:79:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:69:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:68:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-CTR length: 192 using empty derivedKey, normal salt, SHA-256, with empty info with bad hash name SHA256",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"NotSupportedError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-CTR length: 192 using empty derivedKey, normal salt, SHA-256, with empty info with missing deriveKey usage",1,"assert_equals: deriveKey with missing deriveKey usage correctly threw InvalidAccessError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"InvalidAccessError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:104:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:100:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:99:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-CTR length: 192 using empty derivedKey, normal salt, SHA-256, with empty info with wrong (ECDH) key",0,{},{}],["Derived key of type name: AES-CTR length: 256 using empty derivedKey, normal salt, SHA-256, with empty info",1,"assert_unreached: deriveKey failed with error TypeError: Argument 2 of SubtleCrypto.deriveKey is not an object. Reached unreachable code","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:79:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:69:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:68:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-CTR length: 256 using empty derivedKey, normal salt, SHA-256, with empty info with bad hash name SHA256",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"NotSupportedError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-CTR length: 256 using empty derivedKey, normal salt, SHA-256, with empty info with missing deriveKey usage",1,"assert_equals: deriveKey with missing deriveKey usage correctly threw InvalidAccessError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"InvalidAccessError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:104:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:100:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:99:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-CTR length: 256 using empty derivedKey, normal salt, SHA-256, with empty info with wrong (ECDH) key",0,{},{}],["Derived key of type name: AES-GCM length: 128 using empty derivedKey, normal salt, SHA-256, with empty info",1,"assert_unreached: deriveKey failed with error TypeError: Argument 2 of SubtleCrypto.deriveKey is not an object. Reached unreachable code","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:79:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:69:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:68:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-GCM length: 128 using empty derivedKey, normal salt, SHA-256, with empty info with bad hash name SHA256",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"NotSupportedError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-GCM length: 128 using empty derivedKey, normal salt, SHA-256, with empty info with missing deriveKey usage",1,"assert_equals: deriveKey with missing deriveKey usage correctly threw InvalidAccessError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"InvalidAccessError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:104:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:100:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:99:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-GCM length: 128 using empty derivedKey, normal salt, SHA-256, with empty info with wrong (ECDH) key",0,{},{}],["Derived key of type name: AES-GCM length: 192 using empty derivedKey, normal salt, SHA-256, with empty info",1,"assert_unreached: deriveKey failed with error TypeError: Argument 2 of SubtleCrypto.deriveKey is not an object. Reached unreachable code","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:79:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:69:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:68:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-GCM length: 192 using empty derivedKey, normal salt, SHA-256, with empty info with bad hash name SHA256",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"NotSupportedError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-GCM length: 192 using empty derivedKey, normal salt, SHA-256, with empty info with missing deriveKey usage",1,"assert_equals: deriveKey with missing deriveKey usage correctly threw InvalidAccessError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"InvalidAccessError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:104:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:100:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:99:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-GCM length: 192 using empty derivedKey, normal salt, SHA-256, with empty info with wrong (ECDH) key",0,{},{}],["Derived key of type name: AES-GCM length: 256 using empty derivedKey, normal salt, SHA-256, with empty info",1,"assert_unreached: deriveKey failed with error TypeError: Argument 2 of SubtleCrypto.deriveKey is not an object. Reached unreachable code","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:79:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:69:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:68:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-GCM length: 256 using empty derivedKey, normal salt, SHA-256, with empty info with bad hash name SHA256",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"NotSupportedError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-GCM length: 256 using empty derivedKey, normal salt, SHA-256, with empty info with missing deriveKey usage",1,"assert_equals: deriveKey with missing deriveKey usage correctly threw InvalidAccessError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"InvalidAccessError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:104:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:100:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:99:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-GCM length: 256 using empty derivedKey, normal salt, SHA-256, with empty info with wrong (ECDH) key",0,{},{}],["Derived key of type name: AES-KW length: 128 using empty derivedKey, normal salt, SHA-256, with empty info",1,"assert_unreached: deriveKey failed with error TypeError: Argument 2 of SubtleCrypto.deriveKey is not an object. Reached unreachable code","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:79:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:69:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:68:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-KW length: 128 using empty derivedKey, normal salt, SHA-256, with empty info with bad hash name SHA256",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"NotSupportedError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-KW length: 128 using empty derivedKey, normal salt, SHA-256, with empty info with missing deriveKey usage",1,"assert_equals: deriveKey with missing deriveKey usage correctly threw InvalidAccessError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"InvalidAccessError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:104:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:100:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:99:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-KW length: 128 using empty derivedKey, normal salt, SHA-256, with empty info with wrong (ECDH) key",0,{},{}],["Derived key of type name: AES-KW length: 192 using empty derivedKey, normal salt, SHA-256, with empty info",1,"assert_unreached: deriveKey failed with error TypeError: Argument 2 of SubtleCrypto.deriveKey is not an object. Reached unreachable code","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:79:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:69:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:68:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-KW length: 192 using empty derivedKey, normal salt, SHA-256, with empty info with bad hash name SHA256",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"NotSupportedError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-KW length: 192 using empty derivedKey, normal salt, SHA-256, with empty info with missing deriveKey usage",1,"assert_equals: deriveKey with missing deriveKey usage correctly threw InvalidAccessError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"InvalidAccessError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:104:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:100:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:99:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-KW length: 192 using empty derivedKey, normal salt, SHA-256, with empty info with wrong (ECDH) key",0,{},{}],["Derived key of type name: AES-KW length: 256 using empty derivedKey, normal salt, SHA-256, with empty info",1,"assert_unreached: deriveKey failed with error TypeError: Argument 2 of SubtleCrypto.deriveKey is not an object. Reached unreachable code","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:79:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:69:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:68:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-KW length: 256 using empty derivedKey, normal salt, SHA-256, with empty info with bad hash name SHA256",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"NotSupportedError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-KW length: 256 using empty derivedKey, normal salt, SHA-256, with empty info with missing deriveKey usage",1,"assert_equals: deriveKey with missing deriveKey usage correctly threw InvalidAccessError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"InvalidAccessError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:104:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:100:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:99:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-KW length: 256 using empty derivedKey, normal salt, SHA-256, with empty info with wrong (ECDH) key",0,{},{}],["Derived key of type name: HMAC hash: SHA-1 length: 256 using empty derivedKey, normal salt, SHA-256, with empty info",1,"assert_unreached: deriveKey failed with error TypeError: Argument 2 of SubtleCrypto.deriveKey is not an object. Reached unreachable code","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:79:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:69:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:68:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: HMAC hash: SHA-1 length: 256 using empty derivedKey, normal salt, SHA-256, with empty info with bad hash name SHA256",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"NotSupportedError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: HMAC hash: SHA-1 length: 256 using empty derivedKey, normal salt, SHA-256, with empty info with missing deriveKey usage",1,"assert_equals: deriveKey with missing deriveKey usage correctly threw InvalidAccessError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"InvalidAccessError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:104:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:100:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:99:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: HMAC hash: SHA-1 length: 256 using empty derivedKey, normal salt, SHA-256, with empty info with wrong (ECDH) key",0,{},{}],["Derived key of type name: HMAC hash: SHA-256 length: 256 using empty derivedKey, normal salt, SHA-256, with empty info",1,"assert_unreached: deriveKey failed with error TypeError: Argument 2 of SubtleCrypto.deriveKey is not an object. Reached unreachable code","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:79:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:69:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:68:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: HMAC hash: SHA-256 length: 256 using empty derivedKey, normal salt, SHA-256, with empty info with bad hash name SHA256",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"NotSupportedError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: HMAC hash: SHA-256 length: 256 using empty derivedKey, normal salt, SHA-256, with empty info with missing deriveKey usage",1,"assert_equals: deriveKey with missing deriveKey usage correctly threw InvalidAccessError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"InvalidAccessError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:104:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:100:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:99:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: HMAC hash: SHA-256 length: 256 using empty derivedKey, normal salt, SHA-256, with empty info with wrong (ECDH) key",0,{},{}],["Derived key of type name: HMAC hash: SHA-384 length: 256 using empty derivedKey, normal salt, SHA-256, with empty info",1,"assert_unreached: deriveKey failed with error TypeError: Argument 2 of SubtleCrypto.deriveKey is not an object. Reached unreachable code","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:79:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:69:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:68:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: HMAC hash: SHA-384 length: 256 using empty derivedKey, normal salt, SHA-256, with empty info with bad hash name SHA256",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"NotSupportedError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: HMAC hash: SHA-384 length: 256 using empty derivedKey, normal salt, SHA-256, with empty info with missing deriveKey usage",1,"assert_equals: deriveKey with missing deriveKey usage correctly threw InvalidAccessError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"InvalidAccessError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:104:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:100:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:99:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: HMAC hash: SHA-384 length: 256 using empty derivedKey, normal salt, SHA-256, with empty info with wrong (ECDH) key",0,{},{}],["Derived key of type name: HMAC hash: SHA-512 length: 256 using empty derivedKey, normal salt, SHA-256, with empty info",1,"assert_unreached: deriveKey failed with error TypeError: Argument 2 of SubtleCrypto.deriveKey is not an object. Reached unreachable code","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:79:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:69:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:68:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: HMAC hash: SHA-512 length: 256 using empty derivedKey, normal salt, SHA-256, with empty info with bad hash name SHA256",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"NotSupportedError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: HMAC hash: SHA-512 length: 256 using empty derivedKey, normal salt, SHA-256, with empty info with missing deriveKey usage",1,"assert_equals: deriveKey with missing deriveKey usage correctly threw InvalidAccessError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"InvalidAccessError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:104:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:100:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:99:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: HMAC hash: SHA-512 length: 256 using empty derivedKey, normal salt, SHA-256, with empty info with wrong (ECDH) key",0,{},{}],["empty derivedKey, normal salt, SHA-256, with empty info with missing salt",0,{},{}],["empty derivedKey, normal salt, SHA-256, with empty info with missing info",0,{},{}],["empty derivedKey, normal salt, SHA-256, with empty info with null length",0,{},{}],["empty derivedKey, normal salt, SHA-256, with empty info with non-multiple of 8 length",1,"assert_equals: deriveBits with non-multiple of 8 length correctly threw OperationError: Argument 2 of SubtleCrypto.deriveBits is not an object. expected \"OperationError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:158:33\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:154:36\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:153:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["empty derivedKey, normal salt, SHA-256, with empty info with bad hash name SHA256",1,"assert_equals: deriveBits with bad hash name correctly threw NotSupportedError: Argument 2 of SubtleCrypto.deriveBits is not an object. expected \"NotSupportedError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:170:33\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:166:36\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:164:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["empty derivedKey, normal salt, SHA-256, with empty info with missing deriveBits usage",1,"assert_equals: deriveBits with missing deriveBits usage correctly threw InvalidAccessError: Argument 2 of SubtleCrypto.deriveBits is not an object. expected \"InvalidAccessError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:180:33\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:176:36\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:175:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["empty derivedKey, normal salt, SHA-256, with empty info with wrong (ECDH) key",0,{},{}],["empty derivedKey, normal salt, PBKDF2, with normal info with non-digest algorithm PBKDF2",1,"assert_equals: deriveBits with non-digest algorithm correctly threw NotSupportedError: Argument 2 of SubtleCrypto.deriveBits is not an object. expected \"NotSupportedError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:210:29\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:206:32\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:205:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:198:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-CBC length: 128 using empty derivedKey, normal salt, PBKDF2, with normal info",1,"assert_equals: derivekey with non-digest algorithm correctly threw NotSupportedError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"NotSupportedError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:226:33\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:222:36\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:221:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:214:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:198:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-CBC length: 192 using empty derivedKey, normal salt, PBKDF2, with normal info",1,"assert_equals: derivekey with non-digest algorithm correctly threw NotSupportedError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"NotSupportedError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:226:33\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:222:36\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:221:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:214:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:198:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-CBC length: 256 using empty derivedKey, normal salt, PBKDF2, with normal info",1,"assert_equals: derivekey with non-digest algorithm correctly threw NotSupportedError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"NotSupportedError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:226:33\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:222:36\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:221:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:214:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:198:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-CTR length: 128 using empty derivedKey, normal salt, PBKDF2, with normal info",1,"assert_equals: derivekey with non-digest algorithm correctly threw NotSupportedError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"NotSupportedError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:226:33\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:222:36\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:221:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:214:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:198:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-CTR length: 192 using empty derivedKey, normal salt, PBKDF2, with normal info",1,"assert_equals: derivekey with non-digest algorithm correctly threw NotSupportedError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"NotSupportedError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:226:33\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:222:36\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:221:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:214:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:198:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-CTR length: 256 using empty derivedKey, normal salt, PBKDF2, with normal info",1,"assert_equals: derivekey with non-digest algorithm correctly threw NotSupportedError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"NotSupportedError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:226:33\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:222:36\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:221:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:214:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:198:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-GCM length: 128 using empty derivedKey, normal salt, PBKDF2, with normal info",1,"assert_equals: derivekey with non-digest algorithm correctly threw NotSupportedError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"NotSupportedError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:226:33\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:222:36\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:221:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:214:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:198:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-GCM length: 192 using empty derivedKey, normal salt, PBKDF2, with normal info",1,"assert_equals: derivekey with non-digest algorithm correctly threw NotSupportedError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"NotSupportedError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:226:33\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:222:36\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:221:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:214:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:198:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-GCM length: 256 using empty derivedKey, normal salt, PBKDF2, with normal info",1,"assert_equals: derivekey with non-digest algorithm correctly threw NotSupportedError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"NotSupportedError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:226:33\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:222:36\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:221:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:214:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:198:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-KW length: 128 using empty derivedKey, normal salt, PBKDF2, with normal info",1,"assert_equals: derivekey with non-digest algorithm correctly threw NotSupportedError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"NotSupportedError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:226:33\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:222:36\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:221:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:214:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:198:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-KW length: 192 using empty derivedKey, normal salt, PBKDF2, with normal info",1,"assert_equals: derivekey with non-digest algorithm correctly threw NotSupportedError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"NotSupportedError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:226:33\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:222:36\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:221:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:214:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:198:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-KW length: 256 using empty derivedKey, normal salt, PBKDF2, with normal info",1,"assert_equals: derivekey with non-digest algorithm correctly threw NotSupportedError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"NotSupportedError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:226:33\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:222:36\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:221:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:214:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:198:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: HMAC hash: SHA-1 length: 256 using empty derivedKey, normal salt, PBKDF2, with normal info",1,"assert_equals: derivekey with non-digest algorithm correctly threw NotSupportedError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"NotSupportedError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:226:33\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:222:36\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:221:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:214:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:198:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: HMAC hash: SHA-256 length: 256 using empty derivedKey, normal salt, PBKDF2, with normal info",1,"assert_equals: derivekey with non-digest algorithm correctly threw NotSupportedError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"NotSupportedError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:226:33\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:222:36\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:221:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:214:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:198:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: HMAC hash: SHA-384 length: 256 using empty derivedKey, normal salt, PBKDF2, with normal info",1,"assert_equals: derivekey with non-digest algorithm correctly threw NotSupportedError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"NotSupportedError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:226:33\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:222:36\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:221:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:214:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:198:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: HMAC hash: SHA-512 length: 256 using empty derivedKey, normal salt, PBKDF2, with normal info",1,"assert_equals: derivekey with non-digest algorithm correctly threw NotSupportedError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"NotSupportedError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:226:33\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:222:36\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:221:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:214:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:198:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["empty derivedKey, normal salt, PBKDF2, with empty info with non-digest algorithm PBKDF2",1,"assert_equals: deriveBits with non-digest algorithm correctly threw NotSupportedError: Argument 2 of SubtleCrypto.deriveBits is not an object. expected \"NotSupportedError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:210:29\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:206:32\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:205:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:198:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-CBC length: 128 using empty derivedKey, normal salt, PBKDF2, with empty info",1,"assert_equals: derivekey with non-digest algorithm correctly threw NotSupportedError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"NotSupportedError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:226:33\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:222:36\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:221:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:214:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:198:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-CBC length: 192 using empty derivedKey, normal salt, PBKDF2, with empty info",1,"assert_equals: derivekey with non-digest algorithm correctly threw NotSupportedError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"NotSupportedError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:226:33\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:222:36\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:221:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:214:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:198:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-CBC length: 256 using empty derivedKey, normal salt, PBKDF2, with empty info",1,"assert_equals: derivekey with non-digest algorithm correctly threw NotSupportedError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"NotSupportedError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:226:33\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:222:36\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:221:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:214:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:198:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-CTR length: 128 using empty derivedKey, normal salt, PBKDF2, with empty info",1,"assert_equals: derivekey with non-digest algorithm correctly threw NotSupportedError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"NotSupportedError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:226:33\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:222:36\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:221:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:214:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:198:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-CTR length: 192 using empty derivedKey, normal salt, PBKDF2, with empty info",1,"assert_equals: derivekey with non-digest algorithm correctly threw NotSupportedError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"NotSupportedError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:226:33\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:222:36\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:221:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:214:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:198:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-CTR length: 256 using empty derivedKey, normal salt, PBKDF2, with empty info",1,"assert_equals: derivekey with non-digest algorithm correctly threw NotSupportedError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"NotSupportedError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:226:33\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:222:36\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:221:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:214:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:198:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-GCM length: 128 using empty derivedKey, normal salt, PBKDF2, with empty info",1,"assert_equals: derivekey with non-digest algorithm correctly threw NotSupportedError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"NotSupportedError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:226:33\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:222:36\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:221:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:214:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:198:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-GCM length: 192 using empty derivedKey, normal salt, PBKDF2, with empty info",1,"assert_equals: derivekey with non-digest algorithm correctly threw NotSupportedError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"NotSupportedError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:226:33\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:222:36\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:221:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:214:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:198:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-GCM length: 256 using empty derivedKey, normal salt, PBKDF2, with empty info",1,"assert_equals: derivekey with non-digest algorithm correctly threw NotSupportedError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"NotSupportedError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:226:33\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:222:36\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:221:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:214:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:198:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-KW length: 128 using empty derivedKey, normal salt, PBKDF2, with empty info",1,"assert_equals: derivekey with non-digest algorithm correctly threw NotSupportedError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"NotSupportedError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:226:33\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:222:36\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:221:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:214:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:198:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-KW length: 192 using empty derivedKey, normal salt, PBKDF2, with empty info",1,"assert_equals: derivekey with non-digest algorithm correctly threw NotSupportedError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"NotSupportedError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:226:33\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:222:36\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:221:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:214:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:198:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-KW length: 256 using empty derivedKey, normal salt, PBKDF2, with empty info",1,"assert_equals: derivekey with non-digest algorithm correctly threw NotSupportedError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"NotSupportedError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:226:33\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:222:36\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:221:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:214:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:198:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: HMAC hash: SHA-1 length: 256 using empty derivedKey, normal salt, PBKDF2, with empty info",1,"assert_equals: derivekey with non-digest algorithm correctly threw NotSupportedError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"NotSupportedError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:226:33\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:222:36\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:221:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:214:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:198:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: HMAC hash: SHA-256 length: 256 using empty derivedKey, normal salt, PBKDF2, with empty info",1,"assert_equals: derivekey with non-digest algorithm correctly threw NotSupportedError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"NotSupportedError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:226:33\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:222:36\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:221:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:214:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:198:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: HMAC hash: SHA-384 length: 256 using empty derivedKey, normal salt, PBKDF2, with empty info",1,"assert_equals: derivekey with non-digest algorithm correctly threw NotSupportedError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"NotSupportedError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:226:33\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:222:36\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:221:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:214:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:198:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: HMAC hash: SHA-512 length: 256 using empty derivedKey, normal salt, PBKDF2, with empty info",1,"assert_equals: derivekey with non-digest algorithm correctly threw NotSupportedError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"NotSupportedError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:226:33\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:222:36\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:221:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:214:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:198:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["empty derivedKey, empty salt, SHA-384, with normal info",1,"assert_unreached: deriveBits failed with error TypeError: Argument 2 of SubtleCrypto.deriveBits is not an object. Reached unreachable code","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:44:33\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:40:36\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:39:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["empty derivedKey, empty salt, SHA-384, with normal info with 0 length",1,"assert_equals: deriveBits with 0 length correctly threw OperationError: Argument 2 of SubtleCrypto.deriveBits is not an object. expected \"OperationError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:54:33\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:50:36\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:49:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-CBC length: 128 using empty derivedKey, empty salt, SHA-384, with normal info",1,"assert_unreached: deriveKey failed with error TypeError: Argument 2 of SubtleCrypto.deriveKey is not an object. Reached unreachable code","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:79:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:69:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:68:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-CBC length: 128 using empty derivedKey, empty salt, SHA-384, with normal info with bad hash name SHA384",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"NotSupportedError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-CBC length: 128 using empty derivedKey, empty salt, SHA-384, with normal info with missing deriveKey usage",1,"assert_equals: deriveKey with missing deriveKey usage correctly threw InvalidAccessError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"InvalidAccessError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:104:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:100:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:99:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-CBC length: 128 using empty derivedKey, empty salt, SHA-384, with normal info with wrong (ECDH) key",0,{},{}],["Derived key of type name: AES-CBC length: 192 using empty derivedKey, empty salt, SHA-384, with normal info",1,"assert_unreached: deriveKey failed with error TypeError: Argument 2 of SubtleCrypto.deriveKey is not an object. Reached unreachable code","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:79:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:69:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:68:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-CBC length: 192 using empty derivedKey, empty salt, SHA-384, with normal info with bad hash name SHA384",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"NotSupportedError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-CBC length: 192 using empty derivedKey, empty salt, SHA-384, with normal info with missing deriveKey usage",1,"assert_equals: deriveKey with missing deriveKey usage correctly threw InvalidAccessError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"InvalidAccessError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:104:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:100:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:99:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-CBC length: 192 using empty derivedKey, empty salt, SHA-384, with normal info with wrong (ECDH) key",0,{},{}],["Derived key of type name: AES-CBC length: 256 using empty derivedKey, empty salt, SHA-384, with normal info",1,"assert_unreached: deriveKey failed with error TypeError: Argument 2 of SubtleCrypto.deriveKey is not an object. Reached unreachable code","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:79:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:69:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:68:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-CBC length: 256 using empty derivedKey, empty salt, SHA-384, with normal info with bad hash name SHA384",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"NotSupportedError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-CBC length: 256 using empty derivedKey, empty salt, SHA-384, with normal info with missing deriveKey usage",1,"assert_equals: deriveKey with missing deriveKey usage correctly threw InvalidAccessError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"InvalidAccessError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:104:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:100:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:99:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-CBC length: 256 using empty derivedKey, empty salt, SHA-384, with normal info with wrong (ECDH) key",0,{},{}],["Derived key of type name: AES-CTR length: 128 using empty derivedKey, empty salt, SHA-384, with normal info",1,"assert_unreached: deriveKey failed with error TypeError: Argument 2 of SubtleCrypto.deriveKey is not an object. Reached unreachable code","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:79:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:69:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:68:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-CTR length: 128 using empty derivedKey, empty salt, SHA-384, with normal info with bad hash name SHA384",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"NotSupportedError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-CTR length: 128 using empty derivedKey, empty salt, SHA-384, with normal info with missing deriveKey usage",1,"assert_equals: deriveKey with missing deriveKey usage correctly threw InvalidAccessError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"InvalidAccessError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:104:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:100:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:99:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-CTR length: 128 using empty derivedKey, empty salt, SHA-384, with normal info with wrong (ECDH) key",0,{},{}],["Derived key of type name: AES-CTR length: 192 using empty derivedKey, empty salt, SHA-384, with normal info",1,"assert_unreached: deriveKey failed with error TypeError: Argument 2 of SubtleCrypto.deriveKey is not an object. Reached unreachable code","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:79:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:69:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:68:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-CTR length: 192 using empty derivedKey, empty salt, SHA-384, with normal info with bad hash name SHA384",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"NotSupportedError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-CTR length: 192 using empty derivedKey, empty salt, SHA-384, with normal info with missing deriveKey usage",1,"assert_equals: deriveKey with missing deriveKey usage correctly threw InvalidAccessError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"InvalidAccessError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:104:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:100:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:99:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-CTR length: 192 using empty derivedKey, empty salt, SHA-384, with normal info with wrong (ECDH) key",0,{},{}],["Derived key of type name: AES-CTR length: 256 using empty derivedKey, empty salt, SHA-384, with normal info",1,"assert_unreached: deriveKey failed with error TypeError: Argument 2 of SubtleCrypto.deriveKey is not an object. Reached unreachable code","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:79:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:69:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:68:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-CTR length: 256 using empty derivedKey, empty salt, SHA-384, with normal info with bad hash name SHA384",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"NotSupportedError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-CTR length: 256 using empty derivedKey, empty salt, SHA-384, with normal info with missing deriveKey usage",1,"assert_equals: deriveKey with missing deriveKey usage correctly threw InvalidAccessError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"InvalidAccessError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:104:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:100:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:99:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-CTR length: 256 using empty derivedKey, empty salt, SHA-384, with normal info with wrong (ECDH) key",0,{},{}],["Derived key of type name: AES-GCM length: 128 using empty derivedKey, empty salt, SHA-384, with normal info",1,"assert_unreached: deriveKey failed with error TypeError: Argument 2 of SubtleCrypto.deriveKey is not an object. Reached unreachable code","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:79:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:69:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:68:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-GCM length: 128 using empty derivedKey, empty salt, SHA-384, with normal info with bad hash name SHA384",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"NotSupportedError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-GCM length: 128 using empty derivedKey, empty salt, SHA-384, with normal info with missing deriveKey usage",1,"assert_equals: deriveKey with missing deriveKey usage correctly threw InvalidAccessError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"InvalidAccessError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:104:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:100:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:99:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-GCM length: 128 using empty derivedKey, empty salt, SHA-384, with normal info with wrong (ECDH) key",0,{},{}],["Derived key of type name: AES-GCM length: 192 using empty derivedKey, empty salt, SHA-384, with normal info",1,"assert_unreached: deriveKey failed with error TypeError: Argument 2 of SubtleCrypto.deriveKey is not an object. Reached unreachable code","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:79:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:69:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:68:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-GCM length: 192 using empty derivedKey, empty salt, SHA-384, with normal info with bad hash name SHA384",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"NotSupportedError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-GCM length: 192 using empty derivedKey, empty salt, SHA-384, with normal info with missing deriveKey usage",1,"assert_equals: deriveKey with missing deriveKey usage correctly threw InvalidAccessError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"InvalidAccessError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:104:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:100:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:99:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-GCM length: 192 using empty derivedKey, empty salt, SHA-384, with normal info with wrong (ECDH) key",0,{},{}],["Derived key of type name: AES-GCM length: 256 using empty derivedKey, empty salt, SHA-384, with normal info",1,"assert_unreached: deriveKey failed with error TypeError: Argument 2 of SubtleCrypto.deriveKey is not an object. Reached unreachable code","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:79:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:69:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:68:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-GCM length: 256 using empty derivedKey, empty salt, SHA-384, with normal info with bad hash name SHA384",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"NotSupportedError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-GCM length: 256 using empty derivedKey, empty salt, SHA-384, with normal info with missing deriveKey usage",1,"assert_equals: deriveKey with missing deriveKey usage correctly threw InvalidAccessError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"InvalidAccessError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:104:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:100:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:99:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-GCM length: 256 using empty derivedKey, empty salt, SHA-384, with normal info with wrong (ECDH) key",0,{},{}],["Derived key of type name: AES-KW length: 128 using empty derivedKey, empty salt, SHA-384, with normal info",1,"assert_unreached: deriveKey failed with error TypeError: Argument 2 of SubtleCrypto.deriveKey is not an object. Reached unreachable code","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:79:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:69:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:68:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-KW length: 128 using empty derivedKey, empty salt, SHA-384, with normal info with bad hash name SHA384",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"NotSupportedError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-KW length: 128 using empty derivedKey, empty salt, SHA-384, with normal info with missing deriveKey usage",1,"assert_equals: deriveKey with missing deriveKey usage correctly threw InvalidAccessError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"InvalidAccessError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:104:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:100:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:99:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-KW length: 128 using empty derivedKey, empty salt, SHA-384, with normal info with wrong (ECDH) key",0,{},{}],["Derived key of type name: AES-KW length: 192 using empty derivedKey, empty salt, SHA-384, with normal info",1,"assert_unreached: deriveKey failed with error TypeError: Argument 2 of SubtleCrypto.deriveKey is not an object. Reached unreachable code","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:79:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:69:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:68:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-KW length: 192 using empty derivedKey, empty salt, SHA-384, with normal info with bad hash name SHA384",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"NotSupportedError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-KW length: 192 using empty derivedKey, empty salt, SHA-384, with normal info with missing deriveKey usage",1,"assert_equals: deriveKey with missing deriveKey usage correctly threw InvalidAccessError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"InvalidAccessError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:104:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:100:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:99:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-KW length: 192 using empty derivedKey, empty salt, SHA-384, with normal info with wrong (ECDH) key",0,{},{}],["Derived key of type name: AES-KW length: 256 using empty derivedKey, empty salt, SHA-384, with normal info",1,"assert_unreached: deriveKey failed with error TypeError: Argument 2 of SubtleCrypto.deriveKey is not an object. Reached unreachable code","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:79:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:69:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:68:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-KW length: 256 using empty derivedKey, empty salt, SHA-384, with normal info with bad hash name SHA384",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"NotSupportedError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-KW length: 256 using empty derivedKey, empty salt, SHA-384, with normal info with missing deriveKey usage",1,"assert_equals: deriveKey with missing deriveKey usage correctly threw InvalidAccessError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"InvalidAccessError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:104:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:100:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:99:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-KW length: 256 using empty derivedKey, empty salt, SHA-384, with normal info with wrong (ECDH) key",0,{},{}],["Derived key of type name: HMAC hash: SHA-1 length: 256 using empty derivedKey, empty salt, SHA-384, with normal info",1,"assert_unreached: deriveKey failed with error TypeError: Argument 2 of SubtleCrypto.deriveKey is not an object. Reached unreachable code","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:79:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:69:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:68:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: HMAC hash: SHA-1 length: 256 using empty derivedKey, empty salt, SHA-384, with normal info with bad hash name SHA384",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"NotSupportedError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: HMAC hash: SHA-1 length: 256 using empty derivedKey, empty salt, SHA-384, with normal info with missing deriveKey usage",1,"assert_equals: deriveKey with missing deriveKey usage correctly threw InvalidAccessError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"InvalidAccessError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:104:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:100:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:99:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: HMAC hash: SHA-1 length: 256 using empty derivedKey, empty salt, SHA-384, with normal info with wrong (ECDH) key",0,{},{}],["Derived key of type name: HMAC hash: SHA-256 length: 256 using empty derivedKey, empty salt, SHA-384, with normal info",1,"assert_unreached: deriveKey failed with error TypeError: Argument 2 of SubtleCrypto.deriveKey is not an object. Reached unreachable code","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:79:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:69:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:68:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: HMAC hash: SHA-256 length: 256 using empty derivedKey, empty salt, SHA-384, with normal info with bad hash name SHA384",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"NotSupportedError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: HMAC hash: SHA-256 length: 256 using empty derivedKey, empty salt, SHA-384, with normal info with missing deriveKey usage",1,"assert_equals: deriveKey with missing deriveKey usage correctly threw InvalidAccessError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"InvalidAccessError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:104:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:100:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:99:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: HMAC hash: SHA-256 length: 256 using empty derivedKey, empty salt, SHA-384, with normal info with wrong (ECDH) key",0,{},{}],["Derived key of type name: HMAC hash: SHA-384 length: 256 using empty derivedKey, empty salt, SHA-384, with normal info",1,"assert_unreached: deriveKey failed with error TypeError: Argument 2 of SubtleCrypto.deriveKey is not an object. Reached unreachable code","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:79:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:69:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:68:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: HMAC hash: SHA-384 length: 256 using empty derivedKey, empty salt, SHA-384, with normal info with bad hash name SHA384",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"NotSupportedError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: HMAC hash: SHA-384 length: 256 using empty derivedKey, empty salt, SHA-384, with normal info with missing deriveKey usage",1,"assert_equals: deriveKey with missing deriveKey usage correctly threw InvalidAccessError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"InvalidAccessError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:104:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:100:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:99:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: HMAC hash: SHA-384 length: 256 using empty derivedKey, empty salt, SHA-384, with normal info with wrong (ECDH) key",0,{},{}],["Derived key of type name: HMAC hash: SHA-512 length: 256 using empty derivedKey, empty salt, SHA-384, with normal info",1,"assert_unreached: deriveKey failed with error TypeError: Argument 2 of SubtleCrypto.deriveKey is not an object. Reached unreachable code","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:79:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:69:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:68:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: HMAC hash: SHA-512 length: 256 using empty derivedKey, empty salt, SHA-384, with normal info with bad hash name SHA384",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"NotSupportedError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: HMAC hash: SHA-512 length: 256 using empty derivedKey, empty salt, SHA-384, with normal info with missing deriveKey usage",1,"assert_equals: deriveKey with missing deriveKey usage correctly threw InvalidAccessError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"InvalidAccessError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:104:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:100:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:99:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: HMAC hash: SHA-512 length: 256 using empty derivedKey, empty salt, SHA-384, with normal info with wrong (ECDH) key",0,{},{}],["empty derivedKey, empty salt, SHA-384, with normal info with missing salt",0,{},{}],["empty derivedKey, empty salt, SHA-384, with normal info with missing info",0,{},{}],["empty derivedKey, empty salt, SHA-384, with normal info with null length",0,{},{}],["empty derivedKey, empty salt, SHA-384, with normal info with non-multiple of 8 length",1,"assert_equals: deriveBits with non-multiple of 8 length correctly threw OperationError: Argument 2 of SubtleCrypto.deriveBits is not an object. expected \"OperationError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:158:33\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:154:36\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:153:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["empty derivedKey, empty salt, SHA-384, with normal info with bad hash name SHA384",1,"assert_equals: deriveBits with bad hash name correctly threw NotSupportedError: Argument 2 of SubtleCrypto.deriveBits is not an object. expected \"NotSupportedError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:170:33\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:166:36\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:164:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["empty derivedKey, empty salt, SHA-384, with normal info with missing deriveBits usage",1,"assert_equals: deriveBits with missing deriveBits usage correctly threw InvalidAccessError: Argument 2 of SubtleCrypto.deriveBits is not an object. expected \"InvalidAccessError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:180:33\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:176:36\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:175:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["empty derivedKey, empty salt, SHA-384, with normal info with wrong (ECDH) key",0,{},{}],["empty derivedKey, empty salt, SHA-384, with empty info",1,"assert_unreached: deriveBits failed with error TypeError: Argument 2 of SubtleCrypto.deriveBits is not an object. Reached unreachable code","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:44:33\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:40:36\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:39:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["empty derivedKey, empty salt, SHA-384, with empty info with 0 length",1,"assert_equals: deriveBits with 0 length correctly threw OperationError: Argument 2 of SubtleCrypto.deriveBits is not an object. expected \"OperationError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:54:33\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:50:36\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:49:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-CBC length: 128 using empty derivedKey, empty salt, SHA-384, with empty info",1,"assert_unreached: deriveKey failed with error TypeError: Argument 2 of SubtleCrypto.deriveKey is not an object. Reached unreachable code","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:79:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:69:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:68:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-CBC length: 128 using empty derivedKey, empty salt, SHA-384, with empty info with bad hash name SHA384",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"NotSupportedError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-CBC length: 128 using empty derivedKey, empty salt, SHA-384, with empty info with missing deriveKey usage",1,"assert_equals: deriveKey with missing deriveKey usage correctly threw InvalidAccessError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"InvalidAccessError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:104:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:100:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:99:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-CBC length: 128 using empty derivedKey, empty salt, SHA-384, with empty info with wrong (ECDH) key",0,{},{}],["Derived key of type name: AES-CBC length: 192 using empty derivedKey, empty salt, SHA-384, with empty info",1,"assert_unreached: deriveKey failed with error TypeError: Argument 2 of SubtleCrypto.deriveKey is not an object. Reached unreachable code","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:79:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:69:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:68:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-CBC length: 192 using empty derivedKey, empty salt, SHA-384, with empty info with bad hash name SHA384",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"NotSupportedError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-CBC length: 192 using empty derivedKey, empty salt, SHA-384, with empty info with missing deriveKey usage",1,"assert_equals: deriveKey with missing deriveKey usage correctly threw InvalidAccessError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"InvalidAccessError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:104:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:100:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:99:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-CBC length: 192 using empty derivedKey, empty salt, SHA-384, with empty info with wrong (ECDH) key",0,{},{}],["Derived key of type name: AES-CBC length: 256 using empty derivedKey, empty salt, SHA-384, with empty info",1,"assert_unreached: deriveKey failed with error TypeError: Argument 2 of SubtleCrypto.deriveKey is not an object. Reached unreachable code","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:79:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:69:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:68:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-CBC length: 256 using empty derivedKey, empty salt, SHA-384, with empty info with bad hash name SHA384",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"NotSupportedError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-CBC length: 256 using empty derivedKey, empty salt, SHA-384, with empty info with missing deriveKey usage",1,"assert_equals: deriveKey with missing deriveKey usage correctly threw InvalidAccessError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"InvalidAccessError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:104:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:100:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:99:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-CBC length: 256 using empty derivedKey, empty salt, SHA-384, with empty info with wrong (ECDH) key",0,{},{}],["Derived key of type name: AES-CTR length: 128 using empty derivedKey, empty salt, SHA-384, with empty info",1,"assert_unreached: deriveKey failed with error TypeError: Argument 2 of SubtleCrypto.deriveKey is not an object. Reached unreachable code","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:79:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:69:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:68:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-CTR length: 128 using empty derivedKey, empty salt, SHA-384, with empty info with bad hash name SHA384",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"NotSupportedError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-CTR length: 128 using empty derivedKey, empty salt, SHA-384, with empty info with missing deriveKey usage",1,"assert_equals: deriveKey with missing deriveKey usage correctly threw InvalidAccessError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"InvalidAccessError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:104:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:100:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:99:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-CTR length: 128 using empty derivedKey, empty salt, SHA-384, with empty info with wrong (ECDH) key",0,{},{}],["Derived key of type name: AES-CTR length: 192 using empty derivedKey, empty salt, SHA-384, with empty info",1,"assert_unreached: deriveKey failed with error TypeError: Argument 2 of SubtleCrypto.deriveKey is not an object. Reached unreachable code","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:79:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:69:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:68:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-CTR length: 192 using empty derivedKey, empty salt, SHA-384, with empty info with bad hash name SHA384",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"NotSupportedError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-CTR length: 192 using empty derivedKey, empty salt, SHA-384, with empty info with missing deriveKey usage",1,"assert_equals: deriveKey with missing deriveKey usage correctly threw InvalidAccessError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"InvalidAccessError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:104:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:100:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:99:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-CTR length: 192 using empty derivedKey, empty salt, SHA-384, with empty info with wrong (ECDH) key",0,{},{}],["Derived key of type name: AES-CTR length: 256 using empty derivedKey, empty salt, SHA-384, with empty info",1,"assert_unreached: deriveKey failed with error TypeError: Argument 2 of SubtleCrypto.deriveKey is not an object. Reached unreachable code","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:79:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:69:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:68:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-CTR length: 256 using empty derivedKey, empty salt, SHA-384, with empty info with bad hash name SHA384",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"NotSupportedError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-CTR length: 256 using empty derivedKey, empty salt, SHA-384, with empty info with missing deriveKey usage",1,"assert_equals: deriveKey with missing deriveKey usage correctly threw InvalidAccessError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"InvalidAccessError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:104:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:100:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:99:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-CTR length: 256 using empty derivedKey, empty salt, SHA-384, with empty info with wrong (ECDH) key",0,{},{}],["Derived key of type name: AES-GCM length: 128 using empty derivedKey, empty salt, SHA-384, with empty info",1,"assert_unreached: deriveKey failed with error TypeError: Argument 2 of SubtleCrypto.deriveKey is not an object. Reached unreachable code","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:79:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:69:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:68:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-GCM length: 128 using empty derivedKey, empty salt, SHA-384, with empty info with bad hash name SHA384",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"NotSupportedError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-GCM length: 128 using empty derivedKey, empty salt, SHA-384, with empty info with missing deriveKey usage",1,"assert_equals: deriveKey with missing deriveKey usage correctly threw InvalidAccessError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"InvalidAccessError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:104:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:100:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:99:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-GCM length: 128 using empty derivedKey, empty salt, SHA-384, with empty info with wrong (ECDH) key",0,{},{}],["Derived key of type name: AES-GCM length: 192 using empty derivedKey, empty salt, SHA-384, with empty info",1,"assert_unreached: deriveKey failed with error TypeError: Argument 2 of SubtleCrypto.deriveKey is not an object. Reached unreachable code","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:79:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:69:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:68:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-GCM length: 192 using empty derivedKey, empty salt, SHA-384, with empty info with bad hash name SHA384",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"NotSupportedError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-GCM length: 192 using empty derivedKey, empty salt, SHA-384, with empty info with missing deriveKey usage",1,"assert_equals: deriveKey with missing deriveKey usage correctly threw InvalidAccessError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"InvalidAccessError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:104:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:100:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:99:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-GCM length: 192 using empty derivedKey, empty salt, SHA-384, with empty info with wrong (ECDH) key",0,{},{}],["Derived key of type name: AES-GCM length: 256 using empty derivedKey, empty salt, SHA-384, with empty info",1,"assert_unreached: deriveKey failed with error TypeError: Argument 2 of SubtleCrypto.deriveKey is not an object. Reached unreachable code","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:79:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:69:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:68:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-GCM length: 256 using empty derivedKey, empty salt, SHA-384, with empty info with bad hash name SHA384",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"NotSupportedError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-GCM length: 256 using empty derivedKey, empty salt, SHA-384, with empty info with missing deriveKey usage",1,"assert_equals: deriveKey with missing deriveKey usage correctly threw InvalidAccessError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"InvalidAccessError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:104:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:100:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:99:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-GCM length: 256 using empty derivedKey, empty salt, SHA-384, with empty info with wrong (ECDH) key",0,{},{}],["Derived key of type name: AES-KW length: 128 using empty derivedKey, empty salt, SHA-384, with empty info",1,"assert_unreached: deriveKey failed with error TypeError: Argument 2 of SubtleCrypto.deriveKey is not an object. Reached unreachable code","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:79:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:69:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:68:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-KW length: 128 using empty derivedKey, empty salt, SHA-384, with empty info with bad hash name SHA384",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"NotSupportedError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-KW length: 128 using empty derivedKey, empty salt, SHA-384, with empty info with missing deriveKey usage",1,"assert_equals: deriveKey with missing deriveKey usage correctly threw InvalidAccessError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"InvalidAccessError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:104:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:100:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:99:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-KW length: 128 using empty derivedKey, empty salt, SHA-384, with empty info with wrong (ECDH) key",0,{},{}],["Derived key of type name: AES-KW length: 192 using empty derivedKey, empty salt, SHA-384, with empty info",1,"assert_unreached: deriveKey failed with error TypeError: Argument 2 of SubtleCrypto.deriveKey is not an object. Reached unreachable code","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:79:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:69:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:68:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-KW length: 192 using empty derivedKey, empty salt, SHA-384, with empty info with bad hash name SHA384",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"NotSupportedError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-KW length: 192 using empty derivedKey, empty salt, SHA-384, with empty info with missing deriveKey usage",1,"assert_equals: deriveKey with missing deriveKey usage correctly threw InvalidAccessError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"InvalidAccessError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:104:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:100:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:99:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-KW length: 192 using empty derivedKey, empty salt, SHA-384, with empty info with wrong (ECDH) key",0,{},{}],["Derived key of type name: AES-KW length: 256 using empty derivedKey, empty salt, SHA-384, with empty info",1,"assert_unreached: deriveKey failed with error TypeError: Argument 2 of SubtleCrypto.deriveKey is not an object. Reached unreachable code","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:79:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:69:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:68:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-KW length: 256 using empty derivedKey, empty salt, SHA-384, with empty info with bad hash name SHA384",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"NotSupportedError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-KW length: 256 using empty derivedKey, empty salt, SHA-384, with empty info with missing deriveKey usage",1,"assert_equals: deriveKey with missing deriveKey usage correctly threw InvalidAccessError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"InvalidAccessError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:104:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:100:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:99:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-KW length: 256 using empty derivedKey, empty salt, SHA-384, with empty info with wrong (ECDH) key",0,{},{}],["Derived key of type name: HMAC hash: SHA-1 length: 256 using empty derivedKey, empty salt, SHA-384, with empty info",1,"assert_unreached: deriveKey failed with error TypeError: Argument 2 of SubtleCrypto.deriveKey is not an object. Reached unreachable code","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:79:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:69:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:68:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: HMAC hash: SHA-1 length: 256 using empty derivedKey, empty salt, SHA-384, with empty info with bad hash name SHA384",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"NotSupportedError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: HMAC hash: SHA-1 length: 256 using empty derivedKey, empty salt, SHA-384, with empty info with missing deriveKey usage",1,"assert_equals: deriveKey with missing deriveKey usage correctly threw InvalidAccessError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"InvalidAccessError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:104:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:100:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:99:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: HMAC hash: SHA-1 length: 256 using empty derivedKey, empty salt, SHA-384, with empty info with wrong (ECDH) key",0,{},{}],["Derived key of type name: HMAC hash: SHA-256 length: 256 using empty derivedKey, empty salt, SHA-384, with empty info",1,"assert_unreached: deriveKey failed with error TypeError: Argument 2 of SubtleCrypto.deriveKey is not an object. Reached unreachable code","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:79:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:69:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:68:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: HMAC hash: SHA-256 length: 256 using empty derivedKey, empty salt, SHA-384, with empty info with bad hash name SHA384",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"NotSupportedError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: HMAC hash: SHA-256 length: 256 using empty derivedKey, empty salt, SHA-384, with empty info with missing deriveKey usage",1,"assert_equals: deriveKey with missing deriveKey usage correctly threw InvalidAccessError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"InvalidAccessError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:104:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:100:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:99:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: HMAC hash: SHA-256 length: 256 using empty derivedKey, empty salt, SHA-384, with empty info with wrong (ECDH) key",0,{},{}],["Derived key of type name: HMAC hash: SHA-384 length: 256 using empty derivedKey, empty salt, SHA-384, with empty info",1,"assert_unreached: deriveKey failed with error TypeError: Argument 2 of SubtleCrypto.deriveKey is not an object. Reached unreachable code","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:79:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:69:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:68:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: HMAC hash: SHA-384 length: 256 using empty derivedKey, empty salt, SHA-384, with empty info with bad hash name SHA384",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"NotSupportedError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: HMAC hash: SHA-384 length: 256 using empty derivedKey, empty salt, SHA-384, with empty info with missing deriveKey usage",1,"assert_equals: deriveKey with missing deriveKey usage correctly threw InvalidAccessError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"InvalidAccessError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:104:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:100:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:99:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: HMAC hash: SHA-384 length: 256 using empty derivedKey, empty salt, SHA-384, with empty info with wrong (ECDH) key",0,{},{}],["Derived key of type name: HMAC hash: SHA-512 length: 256 using empty derivedKey, empty salt, SHA-384, with empty info",1,"assert_unreached: deriveKey failed with error TypeError: Argument 2 of SubtleCrypto.deriveKey is not an object. Reached unreachable code","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:79:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:69:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:68:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: HMAC hash: SHA-512 length: 256 using empty derivedKey, empty salt, SHA-384, with empty info with bad hash name SHA384",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"NotSupportedError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: HMAC hash: SHA-512 length: 256 using empty derivedKey, empty salt, SHA-384, with empty info with missing deriveKey usage",1,"assert_equals: deriveKey with missing deriveKey usage correctly threw InvalidAccessError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"InvalidAccessError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:104:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:100:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:99:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: HMAC hash: SHA-512 length: 256 using empty derivedKey, empty salt, SHA-384, with empty info with wrong (ECDH) key",0,{},{}],["empty derivedKey, empty salt, SHA-384, with empty info with missing salt",0,{},{}],["empty derivedKey, empty salt, SHA-384, with empty info with missing info",0,{},{}],["empty derivedKey, empty salt, SHA-384, with empty info with null length",0,{},{}],["empty derivedKey, empty salt, SHA-384, with empty info with non-multiple of 8 length",1,"assert_equals: deriveBits with non-multiple of 8 length correctly threw OperationError: Argument 2 of SubtleCrypto.deriveBits is not an object. expected \"OperationError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:158:33\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:154:36\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:153:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["empty derivedKey, empty salt, SHA-384, with empty info with bad hash name SHA384",1,"assert_equals: deriveBits with bad hash name correctly threw NotSupportedError: Argument 2 of SubtleCrypto.deriveBits is not an object. expected \"NotSupportedError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:170:33\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:166:36\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:164:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["empty derivedKey, empty salt, SHA-384, with empty info with missing deriveBits usage",1,"assert_equals: deriveBits with missing deriveBits usage correctly threw InvalidAccessError: Argument 2 of SubtleCrypto.deriveBits is not an object. expected \"InvalidAccessError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:180:33\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:176:36\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:175:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["empty derivedKey, empty salt, SHA-384, with empty info with wrong (ECDH) key",0,{},{}],["empty derivedKey, empty salt, SHA-512, with normal info",1,"assert_unreached: deriveBits failed with error TypeError: Argument 2 of SubtleCrypto.deriveBits is not an object. Reached unreachable code","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:44:33\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:40:36\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:39:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["empty derivedKey, empty salt, SHA-512, with normal info with 0 length",1,"assert_equals: deriveBits with 0 length correctly threw OperationError: Argument 2 of SubtleCrypto.deriveBits is not an object. expected \"OperationError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:54:33\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:50:36\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:49:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-CBC length: 128 using empty derivedKey, empty salt, SHA-512, with normal info",1,"assert_unreached: deriveKey failed with error TypeError: Argument 2 of SubtleCrypto.deriveKey is not an object. Reached unreachable code","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:79:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:69:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:68:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-CBC length: 128 using empty derivedKey, empty salt, SHA-512, with normal info with bad hash name SHA512",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"NotSupportedError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-CBC length: 128 using empty derivedKey, empty salt, SHA-512, with normal info with missing deriveKey usage",1,"assert_equals: deriveKey with missing deriveKey usage correctly threw InvalidAccessError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"InvalidAccessError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:104:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:100:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:99:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-CBC length: 128 using empty derivedKey, empty salt, SHA-512, with normal info with wrong (ECDH) key",0,{},{}],["Derived key of type name: AES-CBC length: 192 using empty derivedKey, empty salt, SHA-512, with normal info",1,"assert_unreached: deriveKey failed with error TypeError: Argument 2 of SubtleCrypto.deriveKey is not an object. Reached unreachable code","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:79:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:69:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:68:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-CBC length: 192 using empty derivedKey, empty salt, SHA-512, with normal info with bad hash name SHA512",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"NotSupportedError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-CBC length: 192 using empty derivedKey, empty salt, SHA-512, with normal info with missing deriveKey usage",1,"assert_equals: deriveKey with missing deriveKey usage correctly threw InvalidAccessError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"InvalidAccessError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:104:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:100:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:99:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-CBC length: 192 using empty derivedKey, empty salt, SHA-512, with normal info with wrong (ECDH) key",0,{},{}],["Derived key of type name: AES-CBC length: 256 using empty derivedKey, empty salt, SHA-512, with normal info",1,"assert_unreached: deriveKey failed with error TypeError: Argument 2 of SubtleCrypto.deriveKey is not an object. Reached unreachable code","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:79:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:69:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:68:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-CBC length: 256 using empty derivedKey, empty salt, SHA-512, with normal info with bad hash name SHA512",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"NotSupportedError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-CBC length: 256 using empty derivedKey, empty salt, SHA-512, with normal info with missing deriveKey usage",1,"assert_equals: deriveKey with missing deriveKey usage correctly threw InvalidAccessError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"InvalidAccessError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:104:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:100:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:99:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-CBC length: 256 using empty derivedKey, empty salt, SHA-512, with normal info with wrong (ECDH) key",0,{},{}],["Derived key of type name: AES-CTR length: 128 using empty derivedKey, empty salt, SHA-512, with normal info",1,"assert_unreached: deriveKey failed with error TypeError: Argument 2 of SubtleCrypto.deriveKey is not an object. Reached unreachable code","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:79:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:69:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:68:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-CTR length: 128 using empty derivedKey, empty salt, SHA-512, with normal info with bad hash name SHA512",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"NotSupportedError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-CTR length: 128 using empty derivedKey, empty salt, SHA-512, with normal info with missing deriveKey usage",1,"assert_equals: deriveKey with missing deriveKey usage correctly threw InvalidAccessError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"InvalidAccessError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:104:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:100:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:99:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-CTR length: 128 using empty derivedKey, empty salt, SHA-512, with normal info with wrong (ECDH) key",0,{},{}],["Derived key of type name: AES-CTR length: 192 using empty derivedKey, empty salt, SHA-512, with normal info",1,"assert_unreached: deriveKey failed with error TypeError: Argument 2 of SubtleCrypto.deriveKey is not an object. Reached unreachable code","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:79:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:69:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:68:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-CTR length: 192 using empty derivedKey, empty salt, SHA-512, with normal info with bad hash name SHA512",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"NotSupportedError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-CTR length: 192 using empty derivedKey, empty salt, SHA-512, with normal info with missing deriveKey usage",1,"assert_equals: deriveKey with missing deriveKey usage correctly threw InvalidAccessError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"InvalidAccessError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:104:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:100:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:99:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-CTR length: 192 using empty derivedKey, empty salt, SHA-512, with normal info with wrong (ECDH) key",0,{},{}],["Derived key of type name: AES-CTR length: 256 using empty derivedKey, empty salt, SHA-512, with normal info",1,"assert_unreached: deriveKey failed with error TypeError: Argument 2 of SubtleCrypto.deriveKey is not an object. Reached unreachable code","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:79:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:69:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:68:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-CTR length: 256 using empty derivedKey, empty salt, SHA-512, with normal info with bad hash name SHA512",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"NotSupportedError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-CTR length: 256 using empty derivedKey, empty salt, SHA-512, with normal info with missing deriveKey usage",1,"assert_equals: deriveKey with missing deriveKey usage correctly threw InvalidAccessError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"InvalidAccessError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:104:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:100:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:99:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-CTR length: 256 using empty derivedKey, empty salt, SHA-512, with normal info with wrong (ECDH) key",0,{},{}],["Derived key of type name: AES-GCM length: 128 using empty derivedKey, empty salt, SHA-512, with normal info",1,"assert_unreached: deriveKey failed with error TypeError: Argument 2 of SubtleCrypto.deriveKey is not an object. Reached unreachable code","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:79:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:69:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:68:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-GCM length: 128 using empty derivedKey, empty salt, SHA-512, with normal info with bad hash name SHA512",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"NotSupportedError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-GCM length: 128 using empty derivedKey, empty salt, SHA-512, with normal info with missing deriveKey usage",1,"assert_equals: deriveKey with missing deriveKey usage correctly threw InvalidAccessError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"InvalidAccessError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:104:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:100:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:99:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-GCM length: 128 using empty derivedKey, empty salt, SHA-512, with normal info with wrong (ECDH) key",0,{},{}],["Derived key of type name: AES-GCM length: 192 using empty derivedKey, empty salt, SHA-512, with normal info",1,"assert_unreached: deriveKey failed with error TypeError: Argument 2 of SubtleCrypto.deriveKey is not an object. Reached unreachable code","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:79:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:69:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:68:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-GCM length: 192 using empty derivedKey, empty salt, SHA-512, with normal info with bad hash name SHA512",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"NotSupportedError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-GCM length: 192 using empty derivedKey, empty salt, SHA-512, with normal info with missing deriveKey usage",1,"assert_equals: deriveKey with missing deriveKey usage correctly threw InvalidAccessError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"InvalidAccessError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:104:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:100:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:99:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-GCM length: 192 using empty derivedKey, empty salt, SHA-512, with normal info with wrong (ECDH) key",0,{},{}],["Derived key of type name: AES-GCM length: 256 using empty derivedKey, empty salt, SHA-512, with normal info",1,"assert_unreached: deriveKey failed with error TypeError: Argument 2 of SubtleCrypto.deriveKey is not an object. Reached unreachable code","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:79:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:69:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:68:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-GCM length: 256 using empty derivedKey, empty salt, SHA-512, with normal info with bad hash name SHA512",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"NotSupportedError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-GCM length: 256 using empty derivedKey, empty salt, SHA-512, with normal info with missing deriveKey usage",1,"assert_equals: deriveKey with missing deriveKey usage correctly threw InvalidAccessError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"InvalidAccessError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:104:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:100:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:99:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-GCM length: 256 using empty derivedKey, empty salt, SHA-512, with normal info with wrong (ECDH) key",0,{},{}],["Derived key of type name: AES-KW length: 128 using empty derivedKey, empty salt, SHA-512, with normal info",1,"assert_unreached: deriveKey failed with error TypeError: Argument 2 of SubtleCrypto.deriveKey is not an object. Reached unreachable code","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:79:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:69:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:68:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-KW length: 128 using empty derivedKey, empty salt, SHA-512, with normal info with bad hash name SHA512",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"NotSupportedError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-KW length: 128 using empty derivedKey, empty salt, SHA-512, with normal info with missing deriveKey usage",1,"assert_equals: deriveKey with missing deriveKey usage correctly threw InvalidAccessError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"InvalidAccessError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:104:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:100:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:99:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-KW length: 128 using empty derivedKey, empty salt, SHA-512, with normal info with wrong (ECDH) key",0,{},{}],["Derived key of type name: AES-KW length: 192 using empty derivedKey, empty salt, SHA-512, with normal info",1,"assert_unreached: deriveKey failed with error TypeError: Argument 2 of SubtleCrypto.deriveKey is not an object. Reached unreachable code","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:79:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:69:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:68:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-KW length: 192 using empty derivedKey, empty salt, SHA-512, with normal info with bad hash name SHA512",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"NotSupportedError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-KW length: 192 using empty derivedKey, empty salt, SHA-512, with normal info with missing deriveKey usage",1,"assert_equals: deriveKey with missing deriveKey usage correctly threw InvalidAccessError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"InvalidAccessError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:104:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:100:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:99:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-KW length: 192 using empty derivedKey, empty salt, SHA-512, with normal info with wrong (ECDH) key",0,{},{}],["Derived key of type name: AES-KW length: 256 using empty derivedKey, empty salt, SHA-512, with normal info",1,"assert_unreached: deriveKey failed with error TypeError: Argument 2 of SubtleCrypto.deriveKey is not an object. Reached unreachable code","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:79:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:69:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:68:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-KW length: 256 using empty derivedKey, empty salt, SHA-512, with normal info with bad hash name SHA512",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"NotSupportedError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-KW length: 256 using empty derivedKey, empty salt, SHA-512, with normal info with missing deriveKey usage",1,"assert_equals: deriveKey with missing deriveKey usage correctly threw InvalidAccessError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"InvalidAccessError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:104:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:100:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:99:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-KW length: 256 using empty derivedKey, empty salt, SHA-512, with normal info with wrong (ECDH) key",0,{},{}],["Derived key of type name: HMAC hash: SHA-1 length: 256 using empty derivedKey, empty salt, SHA-512, with normal info",1,"assert_unreached: deriveKey failed with error TypeError: Argument 2 of SubtleCrypto.deriveKey is not an object. Reached unreachable code","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:79:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:69:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:68:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: HMAC hash: SHA-1 length: 256 using empty derivedKey, empty salt, SHA-512, with normal info with bad hash name SHA512",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"NotSupportedError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: HMAC hash: SHA-1 length: 256 using empty derivedKey, empty salt, SHA-512, with normal info with missing deriveKey usage",1,"assert_equals: deriveKey with missing deriveKey usage correctly threw InvalidAccessError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"InvalidAccessError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:104:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:100:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:99:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: HMAC hash: SHA-1 length: 256 using empty derivedKey, empty salt, SHA-512, with normal info with wrong (ECDH) key",0,{},{}],["Derived key of type name: HMAC hash: SHA-256 length: 256 using empty derivedKey, empty salt, SHA-512, with normal info",1,"assert_unreached: deriveKey failed with error TypeError: Argument 2 of SubtleCrypto.deriveKey is not an object. Reached unreachable code","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:79:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:69:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:68:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: HMAC hash: SHA-256 length: 256 using empty derivedKey, empty salt, SHA-512, with normal info with bad hash name SHA512",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"NotSupportedError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: HMAC hash: SHA-256 length: 256 using empty derivedKey, empty salt, SHA-512, with normal info with missing deriveKey usage",1,"assert_equals: deriveKey with missing deriveKey usage correctly threw InvalidAccessError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"InvalidAccessError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:104:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:100:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:99:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: HMAC hash: SHA-256 length: 256 using empty derivedKey, empty salt, SHA-512, with normal info with wrong (ECDH) key",0,{},{}],["Derived key of type name: HMAC hash: SHA-384 length: 256 using empty derivedKey, empty salt, SHA-512, with normal info",1,"assert_unreached: deriveKey failed with error TypeError: Argument 2 of SubtleCrypto.deriveKey is not an object. Reached unreachable code","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:79:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:69:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:68:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: HMAC hash: SHA-384 length: 256 using empty derivedKey, empty salt, SHA-512, with normal info with bad hash name SHA512",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"NotSupportedError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: HMAC hash: SHA-384 length: 256 using empty derivedKey, empty salt, SHA-512, with normal info with missing deriveKey usage",1,"assert_equals: deriveKey with missing deriveKey usage correctly threw InvalidAccessError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"InvalidAccessError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:104:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:100:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:99:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: HMAC hash: SHA-384 length: 256 using empty derivedKey, empty salt, SHA-512, with normal info with wrong (ECDH) key",0,{},{}],["Derived key of type name: HMAC hash: SHA-512 length: 256 using empty derivedKey, empty salt, SHA-512, with normal info",1,"assert_unreached: deriveKey failed with error TypeError: Argument 2 of SubtleCrypto.deriveKey is not an object. Reached unreachable code","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:79:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:69:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:68:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: HMAC hash: SHA-512 length: 256 using empty derivedKey, empty salt, SHA-512, with normal info with bad hash name SHA512",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"NotSupportedError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: HMAC hash: SHA-512 length: 256 using empty derivedKey, empty salt, SHA-512, with normal info with missing deriveKey usage",1,"assert_equals: deriveKey with missing deriveKey usage correctly threw InvalidAccessError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"InvalidAccessError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:104:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:100:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:99:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: HMAC hash: SHA-512 length: 256 using empty derivedKey, empty salt, SHA-512, with normal info with wrong (ECDH) key",0,{},{}],["empty derivedKey, empty salt, SHA-512, with normal info with missing salt",0,{},{}],["empty derivedKey, empty salt, SHA-512, with normal info with missing info",0,{},{}],["empty derivedKey, empty salt, SHA-512, with normal info with null length",0,{},{}],["empty derivedKey, empty salt, SHA-512, with normal info with non-multiple of 8 length",1,"assert_equals: deriveBits with non-multiple of 8 length correctly threw OperationError: Argument 2 of SubtleCrypto.deriveBits is not an object. expected \"OperationError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:158:33\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:154:36\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:153:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["empty derivedKey, empty salt, SHA-512, with normal info with bad hash name SHA512",1,"assert_equals: deriveBits with bad hash name correctly threw NotSupportedError: Argument 2 of SubtleCrypto.deriveBits is not an object. expected \"NotSupportedError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:170:33\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:166:36\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:164:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["empty derivedKey, empty salt, SHA-512, with normal info with missing deriveBits usage",1,"assert_equals: deriveBits with missing deriveBits usage correctly threw InvalidAccessError: Argument 2 of SubtleCrypto.deriveBits is not an object. expected \"InvalidAccessError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:180:33\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:176:36\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:175:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["empty derivedKey, empty salt, SHA-512, with normal info with wrong (ECDH) key",0,{},{}],["empty derivedKey, empty salt, SHA-512, with empty info",1,"assert_unreached: deriveBits failed with error TypeError: Argument 2 of SubtleCrypto.deriveBits is not an object. Reached unreachable code","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:44:33\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:40:36\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:39:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["empty derivedKey, empty salt, SHA-512, with empty info with 0 length",1,"assert_equals: deriveBits with 0 length correctly threw OperationError: Argument 2 of SubtleCrypto.deriveBits is not an object. expected \"OperationError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:54:33\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:50:36\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:49:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-CBC length: 128 using empty derivedKey, empty salt, SHA-512, with empty info",1,"assert_unreached: deriveKey failed with error TypeError: Argument 2 of SubtleCrypto.deriveKey is not an object. Reached unreachable code","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:79:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:69:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:68:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-CBC length: 128 using empty derivedKey, empty salt, SHA-512, with empty info with bad hash name SHA512",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"NotSupportedError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-CBC length: 128 using empty derivedKey, empty salt, SHA-512, with empty info with missing deriveKey usage",1,"assert_equals: deriveKey with missing deriveKey usage correctly threw InvalidAccessError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"InvalidAccessError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:104:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:100:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:99:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-CBC length: 128 using empty derivedKey, empty salt, SHA-512, with empty info with wrong (ECDH) key",0,{},{}],["Derived key of type name: AES-CBC length: 192 using empty derivedKey, empty salt, SHA-512, with empty info",1,"assert_unreached: deriveKey failed with error TypeError: Argument 2 of SubtleCrypto.deriveKey is not an object. Reached unreachable code","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:79:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:69:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:68:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-CBC length: 192 using empty derivedKey, empty salt, SHA-512, with empty info with bad hash name SHA512",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"NotSupportedError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-CBC length: 192 using empty derivedKey, empty salt, SHA-512, with empty info with missing deriveKey usage",1,"assert_equals: deriveKey with missing deriveKey usage correctly threw InvalidAccessError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"InvalidAccessError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:104:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:100:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:99:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-CBC length: 192 using empty derivedKey, empty salt, SHA-512, with empty info with wrong (ECDH) key",0,{},{}],["Derived key of type name: AES-CBC length: 256 using empty derivedKey, empty salt, SHA-512, with empty info",1,"assert_unreached: deriveKey failed with error TypeError: Argument 2 of SubtleCrypto.deriveKey is not an object. Reached unreachable code","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:79:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:69:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:68:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-CBC length: 256 using empty derivedKey, empty salt, SHA-512, with empty info with bad hash name SHA512",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"NotSupportedError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-CBC length: 256 using empty derivedKey, empty salt, SHA-512, with empty info with missing deriveKey usage",1,"assert_equals: deriveKey with missing deriveKey usage correctly threw InvalidAccessError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"InvalidAccessError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:104:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:100:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:99:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-CBC length: 256 using empty derivedKey, empty salt, SHA-512, with empty info with wrong (ECDH) key",0,{},{}],["Derived key of type name: AES-CTR length: 128 using empty derivedKey, empty salt, SHA-512, with empty info",1,"assert_unreached: deriveKey failed with error TypeError: Argument 2 of SubtleCrypto.deriveKey is not an object. Reached unreachable code","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:79:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:69:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:68:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-CTR length: 128 using empty derivedKey, empty salt, SHA-512, with empty info with bad hash name SHA512",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"NotSupportedError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-CTR length: 128 using empty derivedKey, empty salt, SHA-512, with empty info with missing deriveKey usage",1,"assert_equals: deriveKey with missing deriveKey usage correctly threw InvalidAccessError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"InvalidAccessError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:104:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:100:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:99:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-CTR length: 128 using empty derivedKey, empty salt, SHA-512, with empty info with wrong (ECDH) key",0,{},{}],["Derived key of type name: AES-CTR length: 192 using empty derivedKey, empty salt, SHA-512, with empty info",1,"assert_unreached: deriveKey failed with error TypeError: Argument 2 of SubtleCrypto.deriveKey is not an object. Reached unreachable code","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:79:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:69:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:68:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-CTR length: 192 using empty derivedKey, empty salt, SHA-512, with empty info with bad hash name SHA512",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"NotSupportedError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-CTR length: 192 using empty derivedKey, empty salt, SHA-512, with empty info with missing deriveKey usage",1,"assert_equals: deriveKey with missing deriveKey usage correctly threw InvalidAccessError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"InvalidAccessError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:104:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:100:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:99:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-CTR length: 192 using empty derivedKey, empty salt, SHA-512, with empty info with wrong (ECDH) key",0,{},{}],["Derived key of type name: AES-CTR length: 256 using empty derivedKey, empty salt, SHA-512, with empty info",1,"assert_unreached: deriveKey failed with error TypeError: Argument 2 of SubtleCrypto.deriveKey is not an object. Reached unreachable code","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:79:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:69:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:68:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-CTR length: 256 using empty derivedKey, empty salt, SHA-512, with empty info with bad hash name SHA512",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"NotSupportedError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-CTR length: 256 using empty derivedKey, empty salt, SHA-512, with empty info with missing deriveKey usage",1,"assert_equals: deriveKey with missing deriveKey usage correctly threw InvalidAccessError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"InvalidAccessError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:104:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:100:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:99:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-CTR length: 256 using empty derivedKey, empty salt, SHA-512, with empty info with wrong (ECDH) key",0,{},{}],["Derived key of type name: AES-GCM length: 128 using empty derivedKey, empty salt, SHA-512, with empty info",1,"assert_unreached: deriveKey failed with error TypeError: Argument 2 of SubtleCrypto.deriveKey is not an object. Reached unreachable code","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:79:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:69:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:68:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-GCM length: 128 using empty derivedKey, empty salt, SHA-512, with empty info with bad hash name SHA512",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"NotSupportedError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-GCM length: 128 using empty derivedKey, empty salt, SHA-512, with empty info with missing deriveKey usage",1,"assert_equals: deriveKey with missing deriveKey usage correctly threw InvalidAccessError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"InvalidAccessError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:104:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:100:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:99:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-GCM length: 128 using empty derivedKey, empty salt, SHA-512, with empty info with wrong (ECDH) key",0,{},{}],["Derived key of type name: AES-GCM length: 192 using empty derivedKey, empty salt, SHA-512, with empty info",1,"assert_unreached: deriveKey failed with error TypeError: Argument 2 of SubtleCrypto.deriveKey is not an object. Reached unreachable code","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:79:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:69:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:68:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-GCM length: 192 using empty derivedKey, empty salt, SHA-512, with empty info with bad hash name SHA512",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"NotSupportedError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-GCM length: 192 using empty derivedKey, empty salt, SHA-512, with empty info with missing deriveKey usage",1,"assert_equals: deriveKey with missing deriveKey usage correctly threw InvalidAccessError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"InvalidAccessError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:104:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:100:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:99:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-GCM length: 192 using empty derivedKey, empty salt, SHA-512, with empty info with wrong (ECDH) key",0,{},{}],["Derived key of type name: AES-GCM length: 256 using empty derivedKey, empty salt, SHA-512, with empty info",1,"assert_unreached: deriveKey failed with error TypeError: Argument 2 of SubtleCrypto.deriveKey is not an object. Reached unreachable code","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:79:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:69:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:68:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-GCM length: 256 using empty derivedKey, empty salt, SHA-512, with empty info with bad hash name SHA512",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"NotSupportedError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-GCM length: 256 using empty derivedKey, empty salt, SHA-512, with empty info with missing deriveKey usage",1,"assert_equals: deriveKey with missing deriveKey usage correctly threw InvalidAccessError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"InvalidAccessError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:104:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:100:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:99:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-GCM length: 256 using empty derivedKey, empty salt, SHA-512, with empty info with wrong (ECDH) key",0,{},{}],["Derived key of type name: AES-KW length: 128 using empty derivedKey, empty salt, SHA-512, with empty info",1,"assert_unreached: deriveKey failed with error TypeError: Argument 2 of SubtleCrypto.deriveKey is not an object. Reached unreachable code","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:79:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:69:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:68:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-KW length: 128 using empty derivedKey, empty salt, SHA-512, with empty info with bad hash name SHA512",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"NotSupportedError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-KW length: 128 using empty derivedKey, empty salt, SHA-512, with empty info with missing deriveKey usage",1,"assert_equals: deriveKey with missing deriveKey usage correctly threw InvalidAccessError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"InvalidAccessError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:104:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:100:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:99:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-KW length: 128 using empty derivedKey, empty salt, SHA-512, with empty info with wrong (ECDH) key",0,{},{}],["Derived key of type name: AES-KW length: 192 using empty derivedKey, empty salt, SHA-512, with empty info",1,"assert_unreached: deriveKey failed with error TypeError: Argument 2 of SubtleCrypto.deriveKey is not an object. Reached unreachable code","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:79:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:69:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:68:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-KW length: 192 using empty derivedKey, empty salt, SHA-512, with empty info with bad hash name SHA512",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"NotSupportedError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-KW length: 192 using empty derivedKey, empty salt, SHA-512, with empty info with missing deriveKey usage",1,"assert_equals: deriveKey with missing deriveKey usage correctly threw InvalidAccessError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"InvalidAccessError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:104:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:100:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:99:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-KW length: 192 using empty derivedKey, empty salt, SHA-512, with empty info with wrong (ECDH) key",0,{},{}],["Derived key of type name: AES-KW length: 256 using empty derivedKey, empty salt, SHA-512, with empty info",1,"assert_unreached: deriveKey failed with error TypeError: Argument 2 of SubtleCrypto.deriveKey is not an object. Reached unreachable code","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:79:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:69:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:68:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-KW length: 256 using empty derivedKey, empty salt, SHA-512, with empty info with bad hash name SHA512",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"NotSupportedError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-KW length: 256 using empty derivedKey, empty salt, SHA-512, with empty info with missing deriveKey usage",1,"assert_equals: deriveKey with missing deriveKey usage correctly threw InvalidAccessError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"InvalidAccessError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:104:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:100:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:99:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-KW length: 256 using empty derivedKey, empty salt, SHA-512, with empty info with wrong (ECDH) key",0,{},{}],["Derived key of type name: HMAC hash: SHA-1 length: 256 using empty derivedKey, empty salt, SHA-512, with empty info",1,"assert_unreached: deriveKey failed with error TypeError: Argument 2 of SubtleCrypto.deriveKey is not an object. Reached unreachable code","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:79:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:69:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:68:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: HMAC hash: SHA-1 length: 256 using empty derivedKey, empty salt, SHA-512, with empty info with bad hash name SHA512",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"NotSupportedError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: HMAC hash: SHA-1 length: 256 using empty derivedKey, empty salt, SHA-512, with empty info with missing deriveKey usage",1,"assert_equals: deriveKey with missing deriveKey usage correctly threw InvalidAccessError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"InvalidAccessError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:104:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:100:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:99:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: HMAC hash: SHA-1 length: 256 using empty derivedKey, empty salt, SHA-512, with empty info with wrong (ECDH) key",0,{},{}],["Derived key of type name: HMAC hash: SHA-256 length: 256 using empty derivedKey, empty salt, SHA-512, with empty info",1,"assert_unreached: deriveKey failed with error TypeError: Argument 2 of SubtleCrypto.deriveKey is not an object. Reached unreachable code","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:79:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:69:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:68:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: HMAC hash: SHA-256 length: 256 using empty derivedKey, empty salt, SHA-512, with empty info with bad hash name SHA512",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"NotSupportedError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: HMAC hash: SHA-256 length: 256 using empty derivedKey, empty salt, SHA-512, with empty info with missing deriveKey usage",1,"assert_equals: deriveKey with missing deriveKey usage correctly threw InvalidAccessError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"InvalidAccessError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:104:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:100:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:99:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: HMAC hash: SHA-256 length: 256 using empty derivedKey, empty salt, SHA-512, with empty info with wrong (ECDH) key",0,{},{}],["Derived key of type name: HMAC hash: SHA-384 length: 256 using empty derivedKey, empty salt, SHA-512, with empty info",1,"assert_unreached: deriveKey failed with error TypeError: Argument 2 of SubtleCrypto.deriveKey is not an object. Reached unreachable code","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:79:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:69:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:68:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: HMAC hash: SHA-384 length: 256 using empty derivedKey, empty salt, SHA-512, with empty info with bad hash name SHA512",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"NotSupportedError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: HMAC hash: SHA-384 length: 256 using empty derivedKey, empty salt, SHA-512, with empty info with missing deriveKey usage",1,"assert_equals: deriveKey with missing deriveKey usage correctly threw InvalidAccessError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"InvalidAccessError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:104:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:100:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:99:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: HMAC hash: SHA-384 length: 256 using empty derivedKey, empty salt, SHA-512, with empty info with wrong (ECDH) key",0,{},{}],["Derived key of type name: HMAC hash: SHA-512 length: 256 using empty derivedKey, empty salt, SHA-512, with empty info",1,"assert_unreached: deriveKey failed with error TypeError: Argument 2 of SubtleCrypto.deriveKey is not an object. Reached unreachable code","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:79:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:69:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:68:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: HMAC hash: SHA-512 length: 256 using empty derivedKey, empty salt, SHA-512, with empty info with bad hash name SHA512",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"NotSupportedError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: HMAC hash: SHA-512 length: 256 using empty derivedKey, empty salt, SHA-512, with empty info with missing deriveKey usage",1,"assert_equals: deriveKey with missing deriveKey usage correctly threw InvalidAccessError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"InvalidAccessError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:104:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:100:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:99:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: HMAC hash: SHA-512 length: 256 using empty derivedKey, empty salt, SHA-512, with empty info with wrong (ECDH) key",0,{},{}],["empty derivedKey, empty salt, SHA-512, with empty info with missing salt",0,{},{}],["empty derivedKey, empty salt, SHA-512, with empty info with missing info",0,{},{}],["empty derivedKey, empty salt, SHA-512, with empty info with null length",0,{},{}],["empty derivedKey, empty salt, SHA-512, with empty info with non-multiple of 8 length",1,"assert_equals: deriveBits with non-multiple of 8 length correctly threw OperationError: Argument 2 of SubtleCrypto.deriveBits is not an object. expected \"OperationError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:158:33\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:154:36\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:153:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["empty derivedKey, empty salt, SHA-512, with empty info with bad hash name SHA512",1,"assert_equals: deriveBits with bad hash name correctly threw NotSupportedError: Argument 2 of SubtleCrypto.deriveBits is not an object. expected \"NotSupportedError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:170:33\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:166:36\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:164:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["empty derivedKey, empty salt, SHA-512, with empty info with missing deriveBits usage",1,"assert_equals: deriveBits with missing deriveBits usage correctly threw InvalidAccessError: Argument 2 of SubtleCrypto.deriveBits is not an object. expected \"InvalidAccessError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:180:33\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:176:36\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:175:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["empty derivedKey, empty salt, SHA-512, with empty info with wrong (ECDH) key",0,{},{}],["empty derivedKey, empty salt, SHA-1, with normal info",1,"assert_unreached: deriveBits failed with error TypeError: Argument 2 of SubtleCrypto.deriveBits is not an object. Reached unreachable code","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:44:33\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:40:36\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:39:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["empty derivedKey, empty salt, SHA-1, with normal info with 0 length",1,"assert_equals: deriveBits with 0 length correctly threw OperationError: Argument 2 of SubtleCrypto.deriveBits is not an object. expected \"OperationError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:54:33\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:50:36\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:49:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-CBC length: 128 using empty derivedKey, empty salt, SHA-1, with normal info",1,"assert_unreached: deriveKey failed with error TypeError: Argument 2 of SubtleCrypto.deriveKey is not an object. Reached unreachable code","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:79:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:69:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:68:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-CBC length: 128 using empty derivedKey, empty salt, SHA-1, with normal info with bad hash name SHA1",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"NotSupportedError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-CBC length: 128 using empty derivedKey, empty salt, SHA-1, with normal info with missing deriveKey usage",1,"assert_equals: deriveKey with missing deriveKey usage correctly threw InvalidAccessError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"InvalidAccessError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:104:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:100:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:99:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-CBC length: 128 using empty derivedKey, empty salt, SHA-1, with normal info with wrong (ECDH) key",0,{},{}],["Derived key of type name: AES-CBC length: 192 using empty derivedKey, empty salt, SHA-1, with normal info",1,"assert_unreached: deriveKey failed with error TypeError: Argument 2 of SubtleCrypto.deriveKey is not an object. Reached unreachable code","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:79:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:69:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:68:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-CBC length: 192 using empty derivedKey, empty salt, SHA-1, with normal info with bad hash name SHA1",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"NotSupportedError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-CBC length: 192 using empty derivedKey, empty salt, SHA-1, with normal info with missing deriveKey usage",1,"assert_equals: deriveKey with missing deriveKey usage correctly threw InvalidAccessError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"InvalidAccessError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:104:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:100:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:99:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-CBC length: 192 using empty derivedKey, empty salt, SHA-1, with normal info with wrong (ECDH) key",0,{},{}],["Derived key of type name: AES-CBC length: 256 using empty derivedKey, empty salt, SHA-1, with normal info",1,"assert_unreached: deriveKey failed with error TypeError: Argument 2 of SubtleCrypto.deriveKey is not an object. Reached unreachable code","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:79:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:69:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:68:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-CBC length: 256 using empty derivedKey, empty salt, SHA-1, with normal info with bad hash name SHA1",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"NotSupportedError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-CBC length: 256 using empty derivedKey, empty salt, SHA-1, with normal info with missing deriveKey usage",1,"assert_equals: deriveKey with missing deriveKey usage correctly threw InvalidAccessError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"InvalidAccessError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:104:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:100:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:99:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-CBC length: 256 using empty derivedKey, empty salt, SHA-1, with normal info with wrong (ECDH) key",0,{},{}],["Derived key of type name: AES-CTR length: 128 using empty derivedKey, empty salt, SHA-1, with normal info",1,"assert_unreached: deriveKey failed with error TypeError: Argument 2 of SubtleCrypto.deriveKey is not an object. Reached unreachable code","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:79:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:69:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:68:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-CTR length: 128 using empty derivedKey, empty salt, SHA-1, with normal info with bad hash name SHA1",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"NotSupportedError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-CTR length: 128 using empty derivedKey, empty salt, SHA-1, with normal info with missing deriveKey usage",1,"assert_equals: deriveKey with missing deriveKey usage correctly threw InvalidAccessError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"InvalidAccessError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:104:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:100:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:99:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-CTR length: 128 using empty derivedKey, empty salt, SHA-1, with normal info with wrong (ECDH) key",0,{},{}],["Derived key of type name: AES-CTR length: 192 using empty derivedKey, empty salt, SHA-1, with normal info",1,"assert_unreached: deriveKey failed with error TypeError: Argument 2 of SubtleCrypto.deriveKey is not an object. Reached unreachable code","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:79:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:69:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:68:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-CTR length: 192 using empty derivedKey, empty salt, SHA-1, with normal info with bad hash name SHA1",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"NotSupportedError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-CTR length: 192 using empty derivedKey, empty salt, SHA-1, with normal info with missing deriveKey usage",1,"assert_equals: deriveKey with missing deriveKey usage correctly threw InvalidAccessError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"InvalidAccessError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:104:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:100:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:99:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-CTR length: 192 using empty derivedKey, empty salt, SHA-1, with normal info with wrong (ECDH) key",0,{},{}],["Derived key of type name: AES-CTR length: 256 using empty derivedKey, empty salt, SHA-1, with normal info",1,"assert_unreached: deriveKey failed with error TypeError: Argument 2 of SubtleCrypto.deriveKey is not an object. Reached unreachable code","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:79:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:69:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:68:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-CTR length: 256 using empty derivedKey, empty salt, SHA-1, with normal info with bad hash name SHA1",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"NotSupportedError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-CTR length: 256 using empty derivedKey, empty salt, SHA-1, with normal info with missing deriveKey usage",1,"assert_equals: deriveKey with missing deriveKey usage correctly threw InvalidAccessError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"InvalidAccessError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:104:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:100:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:99:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-CTR length: 256 using empty derivedKey, empty salt, SHA-1, with normal info with wrong (ECDH) key",0,{},{}],["Derived key of type name: AES-GCM length: 128 using empty derivedKey, empty salt, SHA-1, with normal info",1,"assert_unreached: deriveKey failed with error TypeError: Argument 2 of SubtleCrypto.deriveKey is not an object. Reached unreachable code","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:79:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:69:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:68:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-GCM length: 128 using empty derivedKey, empty salt, SHA-1, with normal info with bad hash name SHA1",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"NotSupportedError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-GCM length: 128 using empty derivedKey, empty salt, SHA-1, with normal info with missing deriveKey usage",1,"assert_equals: deriveKey with missing deriveKey usage correctly threw InvalidAccessError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"InvalidAccessError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:104:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:100:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:99:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-GCM length: 128 using empty derivedKey, empty salt, SHA-1, with normal info with wrong (ECDH) key",0,{},{}],["Derived key of type name: AES-GCM length: 192 using empty derivedKey, empty salt, SHA-1, with normal info",1,"assert_unreached: deriveKey failed with error TypeError: Argument 2 of SubtleCrypto.deriveKey is not an object. Reached unreachable code","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:79:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:69:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:68:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-GCM length: 192 using empty derivedKey, empty salt, SHA-1, with normal info with bad hash name SHA1",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"NotSupportedError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-GCM length: 192 using empty derivedKey, empty salt, SHA-1, with normal info with missing deriveKey usage",1,"assert_equals: deriveKey with missing deriveKey usage correctly threw InvalidAccessError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"InvalidAccessError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:104:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:100:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:99:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-GCM length: 192 using empty derivedKey, empty salt, SHA-1, with normal info with wrong (ECDH) key",0,{},{}],["Derived key of type name: AES-GCM length: 256 using empty derivedKey, empty salt, SHA-1, with normal info",1,"assert_unreached: deriveKey failed with error TypeError: Argument 2 of SubtleCrypto.deriveKey is not an object. Reached unreachable code","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:79:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:69:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:68:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-GCM length: 256 using empty derivedKey, empty salt, SHA-1, with normal info with bad hash name SHA1",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"NotSupportedError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-GCM length: 256 using empty derivedKey, empty salt, SHA-1, with normal info with missing deriveKey usage",1,"assert_equals: deriveKey with missing deriveKey usage correctly threw InvalidAccessError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"InvalidAccessError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:104:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:100:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:99:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-GCM length: 256 using empty derivedKey, empty salt, SHA-1, with normal info with wrong (ECDH) key",0,{},{}],["Derived key of type name: AES-KW length: 128 using empty derivedKey, empty salt, SHA-1, with normal info",1,"assert_unreached: deriveKey failed with error TypeError: Argument 2 of SubtleCrypto.deriveKey is not an object. Reached unreachable code","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:79:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:69:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:68:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-KW length: 128 using empty derivedKey, empty salt, SHA-1, with normal info with bad hash name SHA1",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"NotSupportedError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-KW length: 128 using empty derivedKey, empty salt, SHA-1, with normal info with missing deriveKey usage",1,"assert_equals: deriveKey with missing deriveKey usage correctly threw InvalidAccessError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"InvalidAccessError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:104:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:100:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:99:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-KW length: 128 using empty derivedKey, empty salt, SHA-1, with normal info with wrong (ECDH) key",0,{},{}],["Derived key of type name: AES-KW length: 192 using empty derivedKey, empty salt, SHA-1, with normal info",1,"assert_unreached: deriveKey failed with error TypeError: Argument 2 of SubtleCrypto.deriveKey is not an object. Reached unreachable code","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:79:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:69:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:68:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-KW length: 192 using empty derivedKey, empty salt, SHA-1, with normal info with bad hash name SHA1",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"NotSupportedError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-KW length: 192 using empty derivedKey, empty salt, SHA-1, with normal info with missing deriveKey usage",1,"assert_equals: deriveKey with missing deriveKey usage correctly threw InvalidAccessError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"InvalidAccessError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:104:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:100:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:99:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-KW length: 192 using empty derivedKey, empty salt, SHA-1, with normal info with wrong (ECDH) key",0,{},{}],["Derived key of type name: AES-KW length: 256 using empty derivedKey, empty salt, SHA-1, with normal info",1,"assert_unreached: deriveKey failed with error TypeError: Argument 2 of SubtleCrypto.deriveKey is not an object. Reached unreachable code","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:79:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:69:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:68:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-KW length: 256 using empty derivedKey, empty salt, SHA-1, with normal info with bad hash name SHA1",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"NotSupportedError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-KW length: 256 using empty derivedKey, empty salt, SHA-1, with normal info with missing deriveKey usage",1,"assert_equals: deriveKey with missing deriveKey usage correctly threw InvalidAccessError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"InvalidAccessError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:104:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:100:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:99:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-KW length: 256 using empty derivedKey, empty salt, SHA-1, with normal info with wrong (ECDH) key",0,{},{}],["Derived key of type name: HMAC hash: SHA-1 length: 256 using empty derivedKey, empty salt, SHA-1, with normal info",1,"assert_unreached: deriveKey failed with error TypeError: Argument 2 of SubtleCrypto.deriveKey is not an object. Reached unreachable code","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:79:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:69:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:68:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: HMAC hash: SHA-1 length: 256 using empty derivedKey, empty salt, SHA-1, with normal info with bad hash name SHA1",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"NotSupportedError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: HMAC hash: SHA-1 length: 256 using empty derivedKey, empty salt, SHA-1, with normal info with missing deriveKey usage",1,"assert_equals: deriveKey with missing deriveKey usage correctly threw InvalidAccessError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"InvalidAccessError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:104:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:100:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:99:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: HMAC hash: SHA-1 length: 256 using empty derivedKey, empty salt, SHA-1, with normal info with wrong (ECDH) key",0,{},{}],["Derived key of type name: HMAC hash: SHA-256 length: 256 using empty derivedKey, empty salt, SHA-1, with normal info",1,"assert_unreached: deriveKey failed with error TypeError: Argument 2 of SubtleCrypto.deriveKey is not an object. Reached unreachable code","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:79:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:69:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:68:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: HMAC hash: SHA-256 length: 256 using empty derivedKey, empty salt, SHA-1, with normal info with bad hash name SHA1",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"NotSupportedError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: HMAC hash: SHA-256 length: 256 using empty derivedKey, empty salt, SHA-1, with normal info with missing deriveKey usage",1,"assert_equals: deriveKey with missing deriveKey usage correctly threw InvalidAccessError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"InvalidAccessError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:104:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:100:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:99:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: HMAC hash: SHA-256 length: 256 using empty derivedKey, empty salt, SHA-1, with normal info with wrong (ECDH) key",0,{},{}],["Derived key of type name: HMAC hash: SHA-384 length: 256 using empty derivedKey, empty salt, SHA-1, with normal info",1,"assert_unreached: deriveKey failed with error TypeError: Argument 2 of SubtleCrypto.deriveKey is not an object. Reached unreachable code","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:79:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:69:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:68:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: HMAC hash: SHA-384 length: 256 using empty derivedKey, empty salt, SHA-1, with normal info with bad hash name SHA1",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"NotSupportedError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: HMAC hash: SHA-384 length: 256 using empty derivedKey, empty salt, SHA-1, with normal info with missing deriveKey usage",1,"assert_equals: deriveKey with missing deriveKey usage correctly threw InvalidAccessError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"InvalidAccessError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:104:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:100:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:99:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: HMAC hash: SHA-384 length: 256 using empty derivedKey, empty salt, SHA-1, with normal info with wrong (ECDH) key",0,{},{}],["Derived key of type name: HMAC hash: SHA-512 length: 256 using empty derivedKey, empty salt, SHA-1, with normal info",1,"assert_unreached: deriveKey failed with error TypeError: Argument 2 of SubtleCrypto.deriveKey is not an object. Reached unreachable code","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:79:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:69:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:68:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: HMAC hash: SHA-512 length: 256 using empty derivedKey, empty salt, SHA-1, with normal info with bad hash name SHA1",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"NotSupportedError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: HMAC hash: SHA-512 length: 256 using empty derivedKey, empty salt, SHA-1, with normal info with missing deriveKey usage",1,"assert_equals: deriveKey with missing deriveKey usage correctly threw InvalidAccessError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"InvalidAccessError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:104:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:100:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:99:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: HMAC hash: SHA-512 length: 256 using empty derivedKey, empty salt, SHA-1, with normal info with wrong (ECDH) key",0,{},{}],["empty derivedKey, empty salt, SHA-1, with normal info with missing salt",0,{},{}],["empty derivedKey, empty salt, SHA-1, with normal info with missing info",0,{},{}],["empty derivedKey, empty salt, SHA-1, with normal info with null length",0,{},{}],["empty derivedKey, empty salt, SHA-1, with normal info with non-multiple of 8 length",1,"assert_equals: deriveBits with non-multiple of 8 length correctly threw OperationError: Argument 2 of SubtleCrypto.deriveBits is not an object. expected \"OperationError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:158:33\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:154:36\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:153:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["empty derivedKey, empty salt, SHA-1, with normal info with bad hash name SHA1",1,"assert_equals: deriveBits with bad hash name correctly threw NotSupportedError: Argument 2 of SubtleCrypto.deriveBits is not an object. expected \"NotSupportedError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:170:33\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:166:36\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:164:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["empty derivedKey, empty salt, SHA-1, with normal info with missing deriveBits usage",1,"assert_equals: deriveBits with missing deriveBits usage correctly threw InvalidAccessError: Argument 2 of SubtleCrypto.deriveBits is not an object. expected \"InvalidAccessError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:180:33\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:176:36\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:175:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["empty derivedKey, empty salt, SHA-1, with normal info with wrong (ECDH) key",0,{},{}],["empty derivedKey, empty salt, SHA-1, with empty info",1,"assert_unreached: deriveBits failed with error TypeError: Argument 2 of SubtleCrypto.deriveBits is not an object. Reached unreachable code","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:44:33\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:40:36\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:39:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["empty derivedKey, empty salt, SHA-1, with empty info with 0 length",1,"assert_equals: deriveBits with 0 length correctly threw OperationError: Argument 2 of SubtleCrypto.deriveBits is not an object. expected \"OperationError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:54:33\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:50:36\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:49:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-CBC length: 128 using empty derivedKey, empty salt, SHA-1, with empty info",1,"assert_unreached: deriveKey failed with error TypeError: Argument 2 of SubtleCrypto.deriveKey is not an object. Reached unreachable code","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:79:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:69:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:68:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-CBC length: 128 using empty derivedKey, empty salt, SHA-1, with empty info with bad hash name SHA1",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"NotSupportedError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-CBC length: 128 using empty derivedKey, empty salt, SHA-1, with empty info with missing deriveKey usage",1,"assert_equals: deriveKey with missing deriveKey usage correctly threw InvalidAccessError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"InvalidAccessError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:104:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:100:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:99:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-CBC length: 128 using empty derivedKey, empty salt, SHA-1, with empty info with wrong (ECDH) key",0,{},{}],["Derived key of type name: AES-CBC length: 192 using empty derivedKey, empty salt, SHA-1, with empty info",1,"assert_unreached: deriveKey failed with error TypeError: Argument 2 of SubtleCrypto.deriveKey is not an object. Reached unreachable code","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:79:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:69:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:68:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-CBC length: 192 using empty derivedKey, empty salt, SHA-1, with empty info with bad hash name SHA1",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"NotSupportedError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-CBC length: 192 using empty derivedKey, empty salt, SHA-1, with empty info with missing deriveKey usage",1,"assert_equals: deriveKey with missing deriveKey usage correctly threw InvalidAccessError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"InvalidAccessError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:104:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:100:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:99:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-CBC length: 192 using empty derivedKey, empty salt, SHA-1, with empty info with wrong (ECDH) key",0,{},{}],["Derived key of type name: AES-CBC length: 256 using empty derivedKey, empty salt, SHA-1, with empty info",1,"assert_unreached: deriveKey failed with error TypeError: Argument 2 of SubtleCrypto.deriveKey is not an object. Reached unreachable code","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:79:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:69:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:68:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-CBC length: 256 using empty derivedKey, empty salt, SHA-1, with empty info with bad hash name SHA1",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"NotSupportedError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-CBC length: 256 using empty derivedKey, empty salt, SHA-1, with empty info with missing deriveKey usage",1,"assert_equals: deriveKey with missing deriveKey usage correctly threw InvalidAccessError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"InvalidAccessError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:104:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:100:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:99:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-CBC length: 256 using empty derivedKey, empty salt, SHA-1, with empty info with wrong (ECDH) key",0,{},{}],["Derived key of type name: AES-CTR length: 128 using empty derivedKey, empty salt, SHA-1, with empty info",1,"assert_unreached: deriveKey failed with error TypeError: Argument 2 of SubtleCrypto.deriveKey is not an object. Reached unreachable code","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:79:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:69:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:68:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-CTR length: 128 using empty derivedKey, empty salt, SHA-1, with empty info with bad hash name SHA1",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"NotSupportedError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-CTR length: 128 using empty derivedKey, empty salt, SHA-1, with empty info with missing deriveKey usage",1,"assert_equals: deriveKey with missing deriveKey usage correctly threw InvalidAccessError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"InvalidAccessError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:104:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:100:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:99:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-CTR length: 128 using empty derivedKey, empty salt, SHA-1, with empty info with wrong (ECDH) key",0,{},{}],["Derived key of type name: AES-CTR length: 192 using empty derivedKey, empty salt, SHA-1, with empty info",1,"assert_unreached: deriveKey failed with error TypeError: Argument 2 of SubtleCrypto.deriveKey is not an object. Reached unreachable code","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:79:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:69:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:68:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-CTR length: 192 using empty derivedKey, empty salt, SHA-1, with empty info with bad hash name SHA1",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"NotSupportedError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-CTR length: 192 using empty derivedKey, empty salt, SHA-1, with empty info with missing deriveKey usage",1,"assert_equals: deriveKey with missing deriveKey usage correctly threw InvalidAccessError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"InvalidAccessError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:104:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:100:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:99:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-CTR length: 192 using empty derivedKey, empty salt, SHA-1, with empty info with wrong (ECDH) key",0,{},{}],["Derived key of type name: AES-CTR length: 256 using empty derivedKey, empty salt, SHA-1, with empty info",1,"assert_unreached: deriveKey failed with error TypeError: Argument 2 of SubtleCrypto.deriveKey is not an object. Reached unreachable code","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:79:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:69:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:68:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-CTR length: 256 using empty derivedKey, empty salt, SHA-1, with empty info with bad hash name SHA1",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"NotSupportedError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-CTR length: 256 using empty derivedKey, empty salt, SHA-1, with empty info with missing deriveKey usage",1,"assert_equals: deriveKey with missing deriveKey usage correctly threw InvalidAccessError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"InvalidAccessError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:104:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:100:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:99:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-CTR length: 256 using empty derivedKey, empty salt, SHA-1, with empty info with wrong (ECDH) key",0,{},{}],["Derived key of type name: AES-GCM length: 128 using empty derivedKey, empty salt, SHA-1, with empty info",1,"assert_unreached: deriveKey failed with error TypeError: Argument 2 of SubtleCrypto.deriveKey is not an object. Reached unreachable code","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:79:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:69:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:68:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-GCM length: 128 using empty derivedKey, empty salt, SHA-1, with empty info with bad hash name SHA1",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"NotSupportedError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-GCM length: 128 using empty derivedKey, empty salt, SHA-1, with empty info with missing deriveKey usage",1,"assert_equals: deriveKey with missing deriveKey usage correctly threw InvalidAccessError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"InvalidAccessError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:104:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:100:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:99:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-GCM length: 128 using empty derivedKey, empty salt, SHA-1, with empty info with wrong (ECDH) key",0,{},{}],["Derived key of type name: AES-GCM length: 192 using empty derivedKey, empty salt, SHA-1, with empty info",1,"assert_unreached: deriveKey failed with error TypeError: Argument 2 of SubtleCrypto.deriveKey is not an object. Reached unreachable code","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:79:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:69:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:68:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-GCM length: 192 using empty derivedKey, empty salt, SHA-1, with empty info with bad hash name SHA1",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"NotSupportedError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-GCM length: 192 using empty derivedKey, empty salt, SHA-1, with empty info with missing deriveKey usage",1,"assert_equals: deriveKey with missing deriveKey usage correctly threw InvalidAccessError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"InvalidAccessError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:104:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:100:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:99:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-GCM length: 192 using empty derivedKey, empty salt, SHA-1, with empty info with wrong (ECDH) key",0,{},{}],["Derived key of type name: AES-GCM length: 256 using empty derivedKey, empty salt, SHA-1, with empty info",1,"assert_unreached: deriveKey failed with error TypeError: Argument 2 of SubtleCrypto.deriveKey is not an object. Reached unreachable code","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:79:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:69:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:68:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-GCM length: 256 using empty derivedKey, empty salt, SHA-1, with empty info with bad hash name SHA1",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"NotSupportedError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-GCM length: 256 using empty derivedKey, empty salt, SHA-1, with empty info with missing deriveKey usage",1,"assert_equals: deriveKey with missing deriveKey usage correctly threw InvalidAccessError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"InvalidAccessError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:104:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:100:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:99:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-GCM length: 256 using empty derivedKey, empty salt, SHA-1, with empty info with wrong (ECDH) key",0,{},{}],["Derived key of type name: AES-KW length: 128 using empty derivedKey, empty salt, SHA-1, with empty info",1,"assert_unreached: deriveKey failed with error TypeError: Argument 2 of SubtleCrypto.deriveKey is not an object. Reached unreachable code","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:79:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:69:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:68:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-KW length: 128 using empty derivedKey, empty salt, SHA-1, with empty info with bad hash name SHA1",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"NotSupportedError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-KW length: 128 using empty derivedKey, empty salt, SHA-1, with empty info with missing deriveKey usage",1,"assert_equals: deriveKey with missing deriveKey usage correctly threw InvalidAccessError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"InvalidAccessError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:104:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:100:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:99:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-KW length: 128 using empty derivedKey, empty salt, SHA-1, with empty info with wrong (ECDH) key",0,{},{}],["Derived key of type name: AES-KW length: 192 using empty derivedKey, empty salt, SHA-1, with empty info",1,"assert_unreached: deriveKey failed with error TypeError: Argument 2 of SubtleCrypto.deriveKey is not an object. Reached unreachable code","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:79:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:69:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:68:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-KW length: 192 using empty derivedKey, empty salt, SHA-1, with empty info with bad hash name SHA1",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"NotSupportedError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-KW length: 192 using empty derivedKey, empty salt, SHA-1, with empty info with missing deriveKey usage",1,"assert_equals: deriveKey with missing deriveKey usage correctly threw InvalidAccessError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"InvalidAccessError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:104:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:100:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:99:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-KW length: 192 using empty derivedKey, empty salt, SHA-1, with empty info with wrong (ECDH) key",0,{},{}],["Derived key of type name: AES-KW length: 256 using empty derivedKey, empty salt, SHA-1, with empty info",1,"assert_unreached: deriveKey failed with error TypeError: Argument 2 of SubtleCrypto.deriveKey is not an object. Reached unreachable code","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:79:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:69:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:68:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-KW length: 256 using empty derivedKey, empty salt, SHA-1, with empty info with bad hash name SHA1",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"NotSupportedError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-KW length: 256 using empty derivedKey, empty salt, SHA-1, with empty info with missing deriveKey usage",1,"assert_equals: deriveKey with missing deriveKey usage correctly threw InvalidAccessError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"InvalidAccessError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:104:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:100:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:99:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-KW length: 256 using empty derivedKey, empty salt, SHA-1, with empty info with wrong (ECDH) key",0,{},{}],["Derived key of type name: HMAC hash: SHA-1 length: 256 using empty derivedKey, empty salt, SHA-1, with empty info",1,"assert_unreached: deriveKey failed with error TypeError: Argument 2 of SubtleCrypto.deriveKey is not an object. Reached unreachable code","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:79:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:69:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:68:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: HMAC hash: SHA-1 length: 256 using empty derivedKey, empty salt, SHA-1, with empty info with bad hash name SHA1",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"NotSupportedError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: HMAC hash: SHA-1 length: 256 using empty derivedKey, empty salt, SHA-1, with empty info with missing deriveKey usage",1,"assert_equals: deriveKey with missing deriveKey usage correctly threw InvalidAccessError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"InvalidAccessError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:104:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:100:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:99:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: HMAC hash: SHA-1 length: 256 using empty derivedKey, empty salt, SHA-1, with empty info with wrong (ECDH) key",0,{},{}],["Derived key of type name: HMAC hash: SHA-256 length: 256 using empty derivedKey, empty salt, SHA-1, with empty info",1,"assert_unreached: deriveKey failed with error TypeError: Argument 2 of SubtleCrypto.deriveKey is not an object. Reached unreachable code","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:79:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:69:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:68:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: HMAC hash: SHA-256 length: 256 using empty derivedKey, empty salt, SHA-1, with empty info with bad hash name SHA1",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"NotSupportedError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: HMAC hash: SHA-256 length: 256 using empty derivedKey, empty salt, SHA-1, with empty info with missing deriveKey usage",1,"assert_equals: deriveKey with missing deriveKey usage correctly threw InvalidAccessError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"InvalidAccessError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:104:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:100:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:99:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: HMAC hash: SHA-256 length: 256 using empty derivedKey, empty salt, SHA-1, with empty info with wrong (ECDH) key",0,{},{}],["Derived key of type name: HMAC hash: SHA-384 length: 256 using empty derivedKey, empty salt, SHA-1, with empty info",1,"assert_unreached: deriveKey failed with error TypeError: Argument 2 of SubtleCrypto.deriveKey is not an object. Reached unreachable code","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:79:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:69:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:68:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: HMAC hash: SHA-384 length: 256 using empty derivedKey, empty salt, SHA-1, with empty info with bad hash name SHA1",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"NotSupportedError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: HMAC hash: SHA-384 length: 256 using empty derivedKey, empty salt, SHA-1, with empty info with missing deriveKey usage",1,"assert_equals: deriveKey with missing deriveKey usage correctly threw InvalidAccessError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"InvalidAccessError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:104:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:100:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:99:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: HMAC hash: SHA-384 length: 256 using empty derivedKey, empty salt, SHA-1, with empty info with wrong (ECDH) key",0,{},{}],["Derived key of type name: HMAC hash: SHA-512 length: 256 using empty derivedKey, empty salt, SHA-1, with empty info",1,"assert_unreached: deriveKey failed with error TypeError: Argument 2 of SubtleCrypto.deriveKey is not an object. Reached unreachable code","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:79:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:69:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:68:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: HMAC hash: SHA-512 length: 256 using empty derivedKey, empty salt, SHA-1, with empty info with bad hash name SHA1",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"NotSupportedError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: HMAC hash: SHA-512 length: 256 using empty derivedKey, empty salt, SHA-1, with empty info with missing deriveKey usage",1,"assert_equals: deriveKey with missing deriveKey usage correctly threw InvalidAccessError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"InvalidAccessError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:104:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:100:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:99:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: HMAC hash: SHA-512 length: 256 using empty derivedKey, empty salt, SHA-1, with empty info with wrong (ECDH) key",0,{},{}],["empty derivedKey, empty salt, SHA-1, with empty info with missing salt",0,{},{}],["empty derivedKey, empty salt, SHA-1, with empty info with missing info",0,{},{}],["empty derivedKey, empty salt, SHA-1, with empty info with null length",0,{},{}],["empty derivedKey, empty salt, SHA-1, with empty info with non-multiple of 8 length",1,"assert_equals: deriveBits with non-multiple of 8 length correctly threw OperationError: Argument 2 of SubtleCrypto.deriveBits is not an object. expected \"OperationError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:158:33\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:154:36\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:153:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["empty derivedKey, empty salt, SHA-1, with empty info with bad hash name SHA1",1,"assert_equals: deriveBits with bad hash name correctly threw NotSupportedError: Argument 2 of SubtleCrypto.deriveBits is not an object. expected \"NotSupportedError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:170:33\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:166:36\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:164:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["empty derivedKey, empty salt, SHA-1, with empty info with missing deriveBits usage",1,"assert_equals: deriveBits with missing deriveBits usage correctly threw InvalidAccessError: Argument 2 of SubtleCrypto.deriveBits is not an object. expected \"InvalidAccessError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:180:33\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:176:36\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:175:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["empty derivedKey, empty salt, SHA-1, with empty info with wrong (ECDH) key",0,{},{}],["empty derivedKey, empty salt, SHA-256, with normal info",1,"assert_unreached: deriveBits failed with error TypeError: Argument 2 of SubtleCrypto.deriveBits is not an object. Reached unreachable code","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:44:33\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:40:36\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:39:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["empty derivedKey, empty salt, SHA-256, with normal info with 0 length",1,"assert_equals: deriveBits with 0 length correctly threw OperationError: Argument 2 of SubtleCrypto.deriveBits is not an object. expected \"OperationError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:54:33\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:50:36\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:49:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-CBC length: 128 using empty derivedKey, empty salt, SHA-256, with normal info",1,"assert_unreached: deriveKey failed with error TypeError: Argument 2 of SubtleCrypto.deriveKey is not an object. Reached unreachable code","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:79:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:69:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:68:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-CBC length: 128 using empty derivedKey, empty salt, SHA-256, with normal info with bad hash name SHA256",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"NotSupportedError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-CBC length: 128 using empty derivedKey, empty salt, SHA-256, with normal info with missing deriveKey usage",1,"assert_equals: deriveKey with missing deriveKey usage correctly threw InvalidAccessError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"InvalidAccessError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:104:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:100:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:99:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-CBC length: 128 using empty derivedKey, empty salt, SHA-256, with normal info with wrong (ECDH) key",0,{},{}],["Derived key of type name: AES-CBC length: 192 using empty derivedKey, empty salt, SHA-256, with normal info",1,"assert_unreached: deriveKey failed with error TypeError: Argument 2 of SubtleCrypto.deriveKey is not an object. Reached unreachable code","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:79:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:69:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:68:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-CBC length: 192 using empty derivedKey, empty salt, SHA-256, with normal info with bad hash name SHA256",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"NotSupportedError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-CBC length: 192 using empty derivedKey, empty salt, SHA-256, with normal info with missing deriveKey usage",1,"assert_equals: deriveKey with missing deriveKey usage correctly threw InvalidAccessError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"InvalidAccessError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:104:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:100:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:99:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-CBC length: 192 using empty derivedKey, empty salt, SHA-256, with normal info with wrong (ECDH) key",0,{},{}],["Derived key of type name: AES-CBC length: 256 using empty derivedKey, empty salt, SHA-256, with normal info",1,"assert_unreached: deriveKey failed with error TypeError: Argument 2 of SubtleCrypto.deriveKey is not an object. Reached unreachable code","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:79:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:69:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:68:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-CBC length: 256 using empty derivedKey, empty salt, SHA-256, with normal info with bad hash name SHA256",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"NotSupportedError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-CBC length: 256 using empty derivedKey, empty salt, SHA-256, with normal info with missing deriveKey usage",1,"assert_equals: deriveKey with missing deriveKey usage correctly threw InvalidAccessError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"InvalidAccessError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:104:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:100:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:99:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-CBC length: 256 using empty derivedKey, empty salt, SHA-256, with normal info with wrong (ECDH) key",0,{},{}],["Derived key of type name: AES-CTR length: 128 using empty derivedKey, empty salt, SHA-256, with normal info",1,"assert_unreached: deriveKey failed with error TypeError: Argument 2 of SubtleCrypto.deriveKey is not an object. Reached unreachable code","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:79:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:69:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:68:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-CTR length: 128 using empty derivedKey, empty salt, SHA-256, with normal info with bad hash name SHA256",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"NotSupportedError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-CTR length: 128 using empty derivedKey, empty salt, SHA-256, with normal info with missing deriveKey usage",1,"assert_equals: deriveKey with missing deriveKey usage correctly threw InvalidAccessError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"InvalidAccessError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:104:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:100:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:99:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-CTR length: 128 using empty derivedKey, empty salt, SHA-256, with normal info with wrong (ECDH) key",0,{},{}],["Derived key of type name: AES-CTR length: 192 using empty derivedKey, empty salt, SHA-256, with normal info",1,"assert_unreached: deriveKey failed with error TypeError: Argument 2 of SubtleCrypto.deriveKey is not an object. Reached unreachable code","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:79:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:69:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:68:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-CTR length: 192 using empty derivedKey, empty salt, SHA-256, with normal info with bad hash name SHA256",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"NotSupportedError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-CTR length: 192 using empty derivedKey, empty salt, SHA-256, with normal info with missing deriveKey usage",1,"assert_equals: deriveKey with missing deriveKey usage correctly threw InvalidAccessError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"InvalidAccessError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:104:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:100:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:99:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-CTR length: 192 using empty derivedKey, empty salt, SHA-256, with normal info with wrong (ECDH) key",0,{},{}],["Derived key of type name: AES-CTR length: 256 using empty derivedKey, empty salt, SHA-256, with normal info",1,"assert_unreached: deriveKey failed with error TypeError: Argument 2 of SubtleCrypto.deriveKey is not an object. Reached unreachable code","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:79:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:69:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:68:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-CTR length: 256 using empty derivedKey, empty salt, SHA-256, with normal info with bad hash name SHA256",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"NotSupportedError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-CTR length: 256 using empty derivedKey, empty salt, SHA-256, with normal info with missing deriveKey usage",1,"assert_equals: deriveKey with missing deriveKey usage correctly threw InvalidAccessError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"InvalidAccessError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:104:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:100:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:99:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-CTR length: 256 using empty derivedKey, empty salt, SHA-256, with normal info with wrong (ECDH) key",0,{},{}],["Derived key of type name: AES-GCM length: 128 using empty derivedKey, empty salt, SHA-256, with normal info",1,"assert_unreached: deriveKey failed with error TypeError: Argument 2 of SubtleCrypto.deriveKey is not an object. Reached unreachable code","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:79:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:69:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:68:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-GCM length: 128 using empty derivedKey, empty salt, SHA-256, with normal info with bad hash name SHA256",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"NotSupportedError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-GCM length: 128 using empty derivedKey, empty salt, SHA-256, with normal info with missing deriveKey usage",1,"assert_equals: deriveKey with missing deriveKey usage correctly threw InvalidAccessError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"InvalidAccessError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:104:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:100:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:99:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-GCM length: 128 using empty derivedKey, empty salt, SHA-256, with normal info with wrong (ECDH) key",0,{},{}],["Derived key of type name: AES-GCM length: 192 using empty derivedKey, empty salt, SHA-256, with normal info",1,"assert_unreached: deriveKey failed with error TypeError: Argument 2 of SubtleCrypto.deriveKey is not an object. Reached unreachable code","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:79:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:69:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:68:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-GCM length: 192 using empty derivedKey, empty salt, SHA-256, with normal info with bad hash name SHA256",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"NotSupportedError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-GCM length: 192 using empty derivedKey, empty salt, SHA-256, with normal info with missing deriveKey usage",1,"assert_equals: deriveKey with missing deriveKey usage correctly threw InvalidAccessError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"InvalidAccessError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:104:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:100:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:99:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-GCM length: 192 using empty derivedKey, empty salt, SHA-256, with normal info with wrong (ECDH) key",0,{},{}],["Derived key of type name: AES-GCM length: 256 using empty derivedKey, empty salt, SHA-256, with normal info",1,"assert_unreached: deriveKey failed with error TypeError: Argument 2 of SubtleCrypto.deriveKey is not an object. Reached unreachable code","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:79:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:69:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:68:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-GCM length: 256 using empty derivedKey, empty salt, SHA-256, with normal info with bad hash name SHA256",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"NotSupportedError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-GCM length: 256 using empty derivedKey, empty salt, SHA-256, with normal info with missing deriveKey usage",1,"assert_equals: deriveKey with missing deriveKey usage correctly threw InvalidAccessError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"InvalidAccessError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:104:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:100:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:99:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-GCM length: 256 using empty derivedKey, empty salt, SHA-256, with normal info with wrong (ECDH) key",0,{},{}],["Derived key of type name: AES-KW length: 128 using empty derivedKey, empty salt, SHA-256, with normal info",1,"assert_unreached: deriveKey failed with error TypeError: Argument 2 of SubtleCrypto.deriveKey is not an object. Reached unreachable code","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:79:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:69:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:68:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-KW length: 128 using empty derivedKey, empty salt, SHA-256, with normal info with bad hash name SHA256",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"NotSupportedError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-KW length: 128 using empty derivedKey, empty salt, SHA-256, with normal info with missing deriveKey usage",1,"assert_equals: deriveKey with missing deriveKey usage correctly threw InvalidAccessError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"InvalidAccessError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:104:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:100:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:99:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-KW length: 128 using empty derivedKey, empty salt, SHA-256, with normal info with wrong (ECDH) key",0,{},{}],["Derived key of type name: AES-KW length: 192 using empty derivedKey, empty salt, SHA-256, with normal info",1,"assert_unreached: deriveKey failed with error TypeError: Argument 2 of SubtleCrypto.deriveKey is not an object. Reached unreachable code","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:79:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:69:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:68:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-KW length: 192 using empty derivedKey, empty salt, SHA-256, with normal info with bad hash name SHA256",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"NotSupportedError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-KW length: 192 using empty derivedKey, empty salt, SHA-256, with normal info with missing deriveKey usage",1,"assert_equals: deriveKey with missing deriveKey usage correctly threw InvalidAccessError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"InvalidAccessError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:104:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:100:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:99:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-KW length: 192 using empty derivedKey, empty salt, SHA-256, with normal info with wrong (ECDH) key",0,{},{}],["Derived key of type name: AES-KW length: 256 using empty derivedKey, empty salt, SHA-256, with normal info",1,"assert_unreached: deriveKey failed with error TypeError: Argument 2 of SubtleCrypto.deriveKey is not an object. Reached unreachable code","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:79:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:69:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:68:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-KW length: 256 using empty derivedKey, empty salt, SHA-256, with normal info with bad hash name SHA256",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"NotSupportedError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-KW length: 256 using empty derivedKey, empty salt, SHA-256, with normal info with missing deriveKey usage",1,"assert_equals: deriveKey with missing deriveKey usage correctly threw InvalidAccessError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"InvalidAccessError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:104:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:100:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:99:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-KW length: 256 using empty derivedKey, empty salt, SHA-256, with normal info with wrong (ECDH) key",0,{},{}],["Derived key of type name: HMAC hash: SHA-1 length: 256 using empty derivedKey, empty salt, SHA-256, with normal info",1,"assert_unreached: deriveKey failed with error TypeError: Argument 2 of SubtleCrypto.deriveKey is not an object. Reached unreachable code","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:79:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:69:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:68:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: HMAC hash: SHA-1 length: 256 using empty derivedKey, empty salt, SHA-256, with normal info with bad hash name SHA256",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"NotSupportedError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: HMAC hash: SHA-1 length: 256 using empty derivedKey, empty salt, SHA-256, with normal info with missing deriveKey usage",1,"assert_equals: deriveKey with missing deriveKey usage correctly threw InvalidAccessError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"InvalidAccessError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:104:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:100:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:99:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: HMAC hash: SHA-1 length: 256 using empty derivedKey, empty salt, SHA-256, with normal info with wrong (ECDH) key",0,{},{}],["Derived key of type name: HMAC hash: SHA-256 length: 256 using empty derivedKey, empty salt, SHA-256, with normal info",1,"assert_unreached: deriveKey failed with error TypeError: Argument 2 of SubtleCrypto.deriveKey is not an object. Reached unreachable code","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:79:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:69:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:68:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: HMAC hash: SHA-256 length: 256 using empty derivedKey, empty salt, SHA-256, with normal info with bad hash name SHA256",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"NotSupportedError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: HMAC hash: SHA-256 length: 256 using empty derivedKey, empty salt, SHA-256, with normal info with missing deriveKey usage",1,"assert_equals: deriveKey with missing deriveKey usage correctly threw InvalidAccessError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"InvalidAccessError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:104:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:100:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:99:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: HMAC hash: SHA-256 length: 256 using empty derivedKey, empty salt, SHA-256, with normal info with wrong (ECDH) key",0,{},{}],["Derived key of type name: HMAC hash: SHA-384 length: 256 using empty derivedKey, empty salt, SHA-256, with normal info",1,"assert_unreached: deriveKey failed with error TypeError: Argument 2 of SubtleCrypto.deriveKey is not an object. Reached unreachable code","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:79:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:69:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:68:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: HMAC hash: SHA-384 length: 256 using empty derivedKey, empty salt, SHA-256, with normal info with bad hash name SHA256",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"NotSupportedError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: HMAC hash: SHA-384 length: 256 using empty derivedKey, empty salt, SHA-256, with normal info with missing deriveKey usage",1,"assert_equals: deriveKey with missing deriveKey usage correctly threw InvalidAccessError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"InvalidAccessError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:104:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:100:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:99:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: HMAC hash: SHA-384 length: 256 using empty derivedKey, empty salt, SHA-256, with normal info with wrong (ECDH) key",0,{},{}],["Derived key of type name: HMAC hash: SHA-512 length: 256 using empty derivedKey, empty salt, SHA-256, with normal info",1,"assert_unreached: deriveKey failed with error TypeError: Argument 2 of SubtleCrypto.deriveKey is not an object. Reached unreachable code","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:79:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:69:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:68:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: HMAC hash: SHA-512 length: 256 using empty derivedKey, empty salt, SHA-256, with normal info with bad hash name SHA256",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"NotSupportedError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: HMAC hash: SHA-512 length: 256 using empty derivedKey, empty salt, SHA-256, with normal info with missing deriveKey usage",1,"assert_equals: deriveKey with missing deriveKey usage correctly threw InvalidAccessError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"InvalidAccessError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:104:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:100:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:99:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: HMAC hash: SHA-512 length: 256 using empty derivedKey, empty salt, SHA-256, with normal info with wrong (ECDH) key",0,{},{}],["empty derivedKey, empty salt, SHA-256, with normal info with missing salt",0,{},{}],["empty derivedKey, empty salt, SHA-256, with normal info with missing info",0,{},{}],["empty derivedKey, empty salt, SHA-256, with normal info with null length",0,{},{}],["empty derivedKey, empty salt, SHA-256, with normal info with non-multiple of 8 length",1,"assert_equals: deriveBits with non-multiple of 8 length correctly threw OperationError: Argument 2 of SubtleCrypto.deriveBits is not an object. expected \"OperationError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:158:33\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:154:36\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:153:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["empty derivedKey, empty salt, SHA-256, with normal info with bad hash name SHA256",1,"assert_equals: deriveBits with bad hash name correctly threw NotSupportedError: Argument 2 of SubtleCrypto.deriveBits is not an object. expected \"NotSupportedError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:170:33\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:166:36\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:164:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["empty derivedKey, empty salt, SHA-256, with normal info with missing deriveBits usage",1,"assert_equals: deriveBits with missing deriveBits usage correctly threw InvalidAccessError: Argument 2 of SubtleCrypto.deriveBits is not an object. expected \"InvalidAccessError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:180:33\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:176:36\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:175:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["empty derivedKey, empty salt, SHA-256, with normal info with wrong (ECDH) key",0,{},{}],["empty derivedKey, empty salt, SHA-256, with empty info",1,"assert_unreached: deriveBits failed with error TypeError: Argument 2 of SubtleCrypto.deriveBits is not an object. Reached unreachable code","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:44:33\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:40:36\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:39:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["empty derivedKey, empty salt, SHA-256, with empty info with 0 length",1,"assert_equals: deriveBits with 0 length correctly threw OperationError: Argument 2 of SubtleCrypto.deriveBits is not an object. expected \"OperationError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:54:33\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:50:36\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:49:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-CBC length: 128 using empty derivedKey, empty salt, SHA-256, with empty info",1,"assert_unreached: deriveKey failed with error TypeError: Argument 2 of SubtleCrypto.deriveKey is not an object. Reached unreachable code","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:79:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:69:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:68:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-CBC length: 128 using empty derivedKey, empty salt, SHA-256, with empty info with bad hash name SHA256",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"NotSupportedError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-CBC length: 128 using empty derivedKey, empty salt, SHA-256, with empty info with missing deriveKey usage",1,"assert_equals: deriveKey with missing deriveKey usage correctly threw InvalidAccessError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"InvalidAccessError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:104:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:100:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:99:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-CBC length: 128 using empty derivedKey, empty salt, SHA-256, with empty info with wrong (ECDH) key",0,{},{}],["Derived key of type name: AES-CBC length: 192 using empty derivedKey, empty salt, SHA-256, with empty info",1,"assert_unreached: deriveKey failed with error TypeError: Argument 2 of SubtleCrypto.deriveKey is not an object. Reached unreachable code","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:79:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:69:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:68:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-CBC length: 192 using empty derivedKey, empty salt, SHA-256, with empty info with bad hash name SHA256",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"NotSupportedError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-CBC length: 192 using empty derivedKey, empty salt, SHA-256, with empty info with missing deriveKey usage",1,"assert_equals: deriveKey with missing deriveKey usage correctly threw InvalidAccessError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"InvalidAccessError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:104:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:100:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:99:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-CBC length: 192 using empty derivedKey, empty salt, SHA-256, with empty info with wrong (ECDH) key",0,{},{}],["Derived key of type name: AES-CBC length: 256 using empty derivedKey, empty salt, SHA-256, with empty info",1,"assert_unreached: deriveKey failed with error TypeError: Argument 2 of SubtleCrypto.deriveKey is not an object. Reached unreachable code","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:79:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:69:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:68:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-CBC length: 256 using empty derivedKey, empty salt, SHA-256, with empty info with bad hash name SHA256",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"NotSupportedError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-CBC length: 256 using empty derivedKey, empty salt, SHA-256, with empty info with missing deriveKey usage",1,"assert_equals: deriveKey with missing deriveKey usage correctly threw InvalidAccessError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"InvalidAccessError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:104:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:100:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:99:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-CBC length: 256 using empty derivedKey, empty salt, SHA-256, with empty info with wrong (ECDH) key",0,{},{}],["Derived key of type name: AES-CTR length: 128 using empty derivedKey, empty salt, SHA-256, with empty info",1,"assert_unreached: deriveKey failed with error TypeError: Argument 2 of SubtleCrypto.deriveKey is not an object. Reached unreachable code","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:79:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:69:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:68:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-CTR length: 128 using empty derivedKey, empty salt, SHA-256, with empty info with bad hash name SHA256",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"NotSupportedError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-CTR length: 128 using empty derivedKey, empty salt, SHA-256, with empty info with missing deriveKey usage",1,"assert_equals: deriveKey with missing deriveKey usage correctly threw InvalidAccessError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"InvalidAccessError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:104:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:100:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:99:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-CTR length: 128 using empty derivedKey, empty salt, SHA-256, with empty info with wrong (ECDH) key",0,{},{}],["Derived key of type name: AES-CTR length: 192 using empty derivedKey, empty salt, SHA-256, with empty info",1,"assert_unreached: deriveKey failed with error TypeError: Argument 2 of SubtleCrypto.deriveKey is not an object. Reached unreachable code","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:79:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:69:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:68:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-CTR length: 192 using empty derivedKey, empty salt, SHA-256, with empty info with bad hash name SHA256",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"NotSupportedError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-CTR length: 192 using empty derivedKey, empty salt, SHA-256, with empty info with missing deriveKey usage",1,"assert_equals: deriveKey with missing deriveKey usage correctly threw InvalidAccessError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"InvalidAccessError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:104:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:100:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:99:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-CTR length: 192 using empty derivedKey, empty salt, SHA-256, with empty info with wrong (ECDH) key",0,{},{}],["Derived key of type name: AES-CTR length: 256 using empty derivedKey, empty salt, SHA-256, with empty info",1,"assert_unreached: deriveKey failed with error TypeError: Argument 2 of SubtleCrypto.deriveKey is not an object. Reached unreachable code","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:79:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:69:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:68:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-CTR length: 256 using empty derivedKey, empty salt, SHA-256, with empty info with bad hash name SHA256",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"NotSupportedError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-CTR length: 256 using empty derivedKey, empty salt, SHA-256, with empty info with missing deriveKey usage",1,"assert_equals: deriveKey with missing deriveKey usage correctly threw InvalidAccessError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"InvalidAccessError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:104:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:100:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:99:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-CTR length: 256 using empty derivedKey, empty salt, SHA-256, with empty info with wrong (ECDH) key",0,{},{}],["Derived key of type name: AES-GCM length: 128 using empty derivedKey, empty salt, SHA-256, with empty info",1,"assert_unreached: deriveKey failed with error TypeError: Argument 2 of SubtleCrypto.deriveKey is not an object. Reached unreachable code","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:79:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:69:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:68:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-GCM length: 128 using empty derivedKey, empty salt, SHA-256, with empty info with bad hash name SHA256",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"NotSupportedError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-GCM length: 128 using empty derivedKey, empty salt, SHA-256, with empty info with missing deriveKey usage",1,"assert_equals: deriveKey with missing deriveKey usage correctly threw InvalidAccessError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"InvalidAccessError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:104:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:100:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:99:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-GCM length: 128 using empty derivedKey, empty salt, SHA-256, with empty info with wrong (ECDH) key",0,{},{}],["Derived key of type name: AES-GCM length: 192 using empty derivedKey, empty salt, SHA-256, with empty info",1,"assert_unreached: deriveKey failed with error TypeError: Argument 2 of SubtleCrypto.deriveKey is not an object. Reached unreachable code","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:79:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:69:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:68:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-GCM length: 192 using empty derivedKey, empty salt, SHA-256, with empty info with bad hash name SHA256",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"NotSupportedError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-GCM length: 192 using empty derivedKey, empty salt, SHA-256, with empty info with missing deriveKey usage",1,"assert_equals: deriveKey with missing deriveKey usage correctly threw InvalidAccessError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"InvalidAccessError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:104:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:100:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:99:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-GCM length: 192 using empty derivedKey, empty salt, SHA-256, with empty info with wrong (ECDH) key",0,{},{}],["Derived key of type name: AES-GCM length: 256 using empty derivedKey, empty salt, SHA-256, with empty info",1,"assert_unreached: deriveKey failed with error TypeError: Argument 2 of SubtleCrypto.deriveKey is not an object. Reached unreachable code","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:79:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:69:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:68:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-GCM length: 256 using empty derivedKey, empty salt, SHA-256, with empty info with bad hash name SHA256",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"NotSupportedError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-GCM length: 256 using empty derivedKey, empty salt, SHA-256, with empty info with missing deriveKey usage",1,"assert_equals: deriveKey with missing deriveKey usage correctly threw InvalidAccessError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"InvalidAccessError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:104:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:100:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:99:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-GCM length: 256 using empty derivedKey, empty salt, SHA-256, with empty info with wrong (ECDH) key",0,{},{}],["Derived key of type name: AES-KW length: 128 using empty derivedKey, empty salt, SHA-256, with empty info",1,"assert_unreached: deriveKey failed with error TypeError: Argument 2 of SubtleCrypto.deriveKey is not an object. Reached unreachable code","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:79:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:69:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:68:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-KW length: 128 using empty derivedKey, empty salt, SHA-256, with empty info with bad hash name SHA256",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"NotSupportedError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-KW length: 128 using empty derivedKey, empty salt, SHA-256, with empty info with missing deriveKey usage",1,"assert_equals: deriveKey with missing deriveKey usage correctly threw InvalidAccessError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"InvalidAccessError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:104:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:100:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:99:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-KW length: 128 using empty derivedKey, empty salt, SHA-256, with empty info with wrong (ECDH) key",0,{},{}],["Derived key of type name: AES-KW length: 192 using empty derivedKey, empty salt, SHA-256, with empty info",1,"assert_unreached: deriveKey failed with error TypeError: Argument 2 of SubtleCrypto.deriveKey is not an object. Reached unreachable code","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:79:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:69:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:68:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-KW length: 192 using empty derivedKey, empty salt, SHA-256, with empty info with bad hash name SHA256",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"NotSupportedError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-KW length: 192 using empty derivedKey, empty salt, SHA-256, with empty info with missing deriveKey usage",1,"assert_equals: deriveKey with missing deriveKey usage correctly threw InvalidAccessError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"InvalidAccessError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:104:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:100:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:99:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-KW length: 192 using empty derivedKey, empty salt, SHA-256, with empty info with wrong (ECDH) key",0,{},{}],["Derived key of type name: AES-KW length: 256 using empty derivedKey, empty salt, SHA-256, with empty info",1,"assert_unreached: deriveKey failed with error TypeError: Argument 2 of SubtleCrypto.deriveKey is not an object. Reached unreachable code","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:79:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:69:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:68:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-KW length: 256 using empty derivedKey, empty salt, SHA-256, with empty info with bad hash name SHA256",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"NotSupportedError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-KW length: 256 using empty derivedKey, empty salt, SHA-256, with empty info with missing deriveKey usage",1,"assert_equals: deriveKey with missing deriveKey usage correctly threw InvalidAccessError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"InvalidAccessError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:104:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:100:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:99:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-KW length: 256 using empty derivedKey, empty salt, SHA-256, with empty info with wrong (ECDH) key",0,{},{}],["Derived key of type name: HMAC hash: SHA-1 length: 256 using empty derivedKey, empty salt, SHA-256, with empty info",1,"assert_unreached: deriveKey failed with error TypeError: Argument 2 of SubtleCrypto.deriveKey is not an object. Reached unreachable code","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:79:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:69:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:68:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: HMAC hash: SHA-1 length: 256 using empty derivedKey, empty salt, SHA-256, with empty info with bad hash name SHA256",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"NotSupportedError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: HMAC hash: SHA-1 length: 256 using empty derivedKey, empty salt, SHA-256, with empty info with missing deriveKey usage",1,"assert_equals: deriveKey with missing deriveKey usage correctly threw InvalidAccessError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"InvalidAccessError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:104:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:100:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:99:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: HMAC hash: SHA-1 length: 256 using empty derivedKey, empty salt, SHA-256, with empty info with wrong (ECDH) key",0,{},{}],["Derived key of type name: HMAC hash: SHA-256 length: 256 using empty derivedKey, empty salt, SHA-256, with empty info",1,"assert_unreached: deriveKey failed with error TypeError: Argument 2 of SubtleCrypto.deriveKey is not an object. Reached unreachable code","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:79:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:69:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:68:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: HMAC hash: SHA-256 length: 256 using empty derivedKey, empty salt, SHA-256, with empty info with bad hash name SHA256",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"NotSupportedError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: HMAC hash: SHA-256 length: 256 using empty derivedKey, empty salt, SHA-256, with empty info with missing deriveKey usage",1,"assert_equals: deriveKey with missing deriveKey usage correctly threw InvalidAccessError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"InvalidAccessError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:104:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:100:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:99:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: HMAC hash: SHA-256 length: 256 using empty derivedKey, empty salt, SHA-256, with empty info with wrong (ECDH) key",0,{},{}],["Derived key of type name: HMAC hash: SHA-384 length: 256 using empty derivedKey, empty salt, SHA-256, with empty info",1,"assert_unreached: deriveKey failed with error TypeError: Argument 2 of SubtleCrypto.deriveKey is not an object. Reached unreachable code","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:79:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:69:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:68:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: HMAC hash: SHA-384 length: 256 using empty derivedKey, empty salt, SHA-256, with empty info with bad hash name SHA256",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"NotSupportedError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: HMAC hash: SHA-384 length: 256 using empty derivedKey, empty salt, SHA-256, with empty info with missing deriveKey usage",1,"assert_equals: deriveKey with missing deriveKey usage correctly threw InvalidAccessError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"InvalidAccessError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:104:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:100:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:99:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: HMAC hash: SHA-384 length: 256 using empty derivedKey, empty salt, SHA-256, with empty info with wrong (ECDH) key",0,{},{}],["Derived key of type name: HMAC hash: SHA-512 length: 256 using empty derivedKey, empty salt, SHA-256, with empty info",1,"assert_unreached: deriveKey failed with error TypeError: Argument 2 of SubtleCrypto.deriveKey is not an object. Reached unreachable code","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:79:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:69:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:68:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: HMAC hash: SHA-512 length: 256 using empty derivedKey, empty salt, SHA-256, with empty info with bad hash name SHA256",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"NotSupportedError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: HMAC hash: SHA-512 length: 256 using empty derivedKey, empty salt, SHA-256, with empty info with missing deriveKey usage",1,"assert_equals: deriveKey with missing deriveKey usage correctly threw InvalidAccessError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"InvalidAccessError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:104:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:100:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:99:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: HMAC hash: SHA-512 length: 256 using empty derivedKey, empty salt, SHA-256, with empty info with wrong (ECDH) key",0,{},{}],["empty derivedKey, empty salt, SHA-256, with empty info with missing salt",0,{},{}],["empty derivedKey, empty salt, SHA-256, with empty info with missing info",0,{},{}],["empty derivedKey, empty salt, SHA-256, with empty info with null length",0,{},{}],["empty derivedKey, empty salt, SHA-256, with empty info with non-multiple of 8 length",1,"assert_equals: deriveBits with non-multiple of 8 length correctly threw OperationError: Argument 2 of SubtleCrypto.deriveBits is not an object. expected \"OperationError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:158:33\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:154:36\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:153:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["empty derivedKey, empty salt, SHA-256, with empty info with bad hash name SHA256",1,"assert_equals: deriveBits with bad hash name correctly threw NotSupportedError: Argument 2 of SubtleCrypto.deriveBits is not an object. expected \"NotSupportedError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:170:33\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:166:36\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:164:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["empty derivedKey, empty salt, SHA-256, with empty info with missing deriveBits usage",1,"assert_equals: deriveBits with missing deriveBits usage correctly threw InvalidAccessError: Argument 2 of SubtleCrypto.deriveBits is not an object. expected \"InvalidAccessError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:180:33\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:176:36\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:175:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["empty derivedKey, empty salt, SHA-256, with empty info with wrong (ECDH) key",0,{},{}],["empty derivedKey, empty salt, PBKDF2, with normal info with non-digest algorithm PBKDF2",1,"assert_equals: deriveBits with non-digest algorithm correctly threw NotSupportedError: Argument 2 of SubtleCrypto.deriveBits is not an object. expected \"NotSupportedError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:210:29\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:206:32\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:205:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:198:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-CBC length: 128 using empty derivedKey, empty salt, PBKDF2, with normal info",1,"assert_equals: derivekey with non-digest algorithm correctly threw NotSupportedError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"NotSupportedError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:226:33\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:222:36\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:221:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:214:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:198:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-CBC length: 192 using empty derivedKey, empty salt, PBKDF2, with normal info",1,"assert_equals: derivekey with non-digest algorithm correctly threw NotSupportedError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"NotSupportedError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:226:33\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:222:36\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:221:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:214:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:198:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-CBC length: 256 using empty derivedKey, empty salt, PBKDF2, with normal info",1,"assert_equals: derivekey with non-digest algorithm correctly threw NotSupportedError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"NotSupportedError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:226:33\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:222:36\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:221:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:214:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:198:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-CTR length: 128 using empty derivedKey, empty salt, PBKDF2, with normal info",1,"assert_equals: derivekey with non-digest algorithm correctly threw NotSupportedError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"NotSupportedError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:226:33\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:222:36\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:221:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:214:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:198:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-CTR length: 192 using empty derivedKey, empty salt, PBKDF2, with normal info",1,"assert_equals: derivekey with non-digest algorithm correctly threw NotSupportedError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"NotSupportedError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:226:33\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:222:36\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:221:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:214:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:198:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-CTR length: 256 using empty derivedKey, empty salt, PBKDF2, with normal info",1,"assert_equals: derivekey with non-digest algorithm correctly threw NotSupportedError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"NotSupportedError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:226:33\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:222:36\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:221:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:214:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:198:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-GCM length: 128 using empty derivedKey, empty salt, PBKDF2, with normal info",1,"assert_equals: derivekey with non-digest algorithm correctly threw NotSupportedError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"NotSupportedError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:226:33\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:222:36\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:221:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:214:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:198:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-GCM length: 192 using empty derivedKey, empty salt, PBKDF2, with normal info",1,"assert_equals: derivekey with non-digest algorithm correctly threw NotSupportedError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"NotSupportedError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:226:33\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:222:36\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:221:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:214:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:198:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-GCM length: 256 using empty derivedKey, empty salt, PBKDF2, with normal info",1,"assert_equals: derivekey with non-digest algorithm correctly threw NotSupportedError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"NotSupportedError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:226:33\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:222:36\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:221:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:214:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:198:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-KW length: 128 using empty derivedKey, empty salt, PBKDF2, with normal info",1,"assert_equals: derivekey with non-digest algorithm correctly threw NotSupportedError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"NotSupportedError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:226:33\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:222:36\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:221:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:214:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:198:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-KW length: 192 using empty derivedKey, empty salt, PBKDF2, with normal info",1,"assert_equals: derivekey with non-digest algorithm correctly threw NotSupportedError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"NotSupportedError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:226:33\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:222:36\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:221:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:214:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:198:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-KW length: 256 using empty derivedKey, empty salt, PBKDF2, with normal info",1,"assert_equals: derivekey with non-digest algorithm correctly threw NotSupportedError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"NotSupportedError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:226:33\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:222:36\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:221:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:214:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:198:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: HMAC hash: SHA-1 length: 256 using empty derivedKey, empty salt, PBKDF2, with normal info",1,"assert_equals: derivekey with non-digest algorithm correctly threw NotSupportedError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"NotSupportedError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:226:33\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:222:36\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:221:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:214:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:198:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: HMAC hash: SHA-256 length: 256 using empty derivedKey, empty salt, PBKDF2, with normal info",1,"assert_equals: derivekey with non-digest algorithm correctly threw NotSupportedError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"NotSupportedError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:226:33\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:222:36\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:221:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:214:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:198:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: HMAC hash: SHA-384 length: 256 using empty derivedKey, empty salt, PBKDF2, with normal info",1,"assert_equals: derivekey with non-digest algorithm correctly threw NotSupportedError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"NotSupportedError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:226:33\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:222:36\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:221:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:214:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:198:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: HMAC hash: SHA-512 length: 256 using empty derivedKey, empty salt, PBKDF2, with normal info",1,"assert_equals: derivekey with non-digest algorithm correctly threw NotSupportedError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"NotSupportedError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:226:33\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:222:36\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:221:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:214:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:198:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["empty derivedKey, empty salt, PBKDF2, with empty info with non-digest algorithm PBKDF2",1,"assert_equals: deriveBits with non-digest algorithm correctly threw NotSupportedError: Argument 2 of SubtleCrypto.deriveBits is not an object. expected \"NotSupportedError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:210:29\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:206:32\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:205:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:198:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-CBC length: 128 using empty derivedKey, empty salt, PBKDF2, with empty info",1,"assert_equals: derivekey with non-digest algorithm correctly threw NotSupportedError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"NotSupportedError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:226:33\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:222:36\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:221:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:214:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:198:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-CBC length: 192 using empty derivedKey, empty salt, PBKDF2, with empty info",1,"assert_equals: derivekey with non-digest algorithm correctly threw NotSupportedError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"NotSupportedError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:226:33\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:222:36\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:221:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:214:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:198:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-CBC length: 256 using empty derivedKey, empty salt, PBKDF2, with empty info",1,"assert_equals: derivekey with non-digest algorithm correctly threw NotSupportedError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"NotSupportedError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:226:33\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:222:36\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:221:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:214:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:198:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-CTR length: 128 using empty derivedKey, empty salt, PBKDF2, with empty info",1,"assert_equals: derivekey with non-digest algorithm correctly threw NotSupportedError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"NotSupportedError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:226:33\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:222:36\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:221:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:214:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:198:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-CTR length: 192 using empty derivedKey, empty salt, PBKDF2, with empty info",1,"assert_equals: derivekey with non-digest algorithm correctly threw NotSupportedError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"NotSupportedError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:226:33\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:222:36\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:221:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:214:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:198:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-CTR length: 256 using empty derivedKey, empty salt, PBKDF2, with empty info",1,"assert_equals: derivekey with non-digest algorithm correctly threw NotSupportedError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"NotSupportedError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:226:33\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:222:36\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:221:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:214:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:198:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-GCM length: 128 using empty derivedKey, empty salt, PBKDF2, with empty info",1,"assert_equals: derivekey with non-digest algorithm correctly threw NotSupportedError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"NotSupportedError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:226:33\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:222:36\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:221:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:214:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:198:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-GCM length: 192 using empty derivedKey, empty salt, PBKDF2, with empty info",1,"assert_equals: derivekey with non-digest algorithm correctly threw NotSupportedError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"NotSupportedError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:226:33\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:222:36\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:221:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:214:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:198:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-GCM length: 256 using empty derivedKey, empty salt, PBKDF2, with empty info",1,"assert_equals: derivekey with non-digest algorithm correctly threw NotSupportedError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"NotSupportedError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:226:33\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:222:36\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:221:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:214:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:198:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-KW length: 128 using empty derivedKey, empty salt, PBKDF2, with empty info",1,"assert_equals: derivekey with non-digest algorithm correctly threw NotSupportedError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"NotSupportedError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:226:33\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:222:36\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:221:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:214:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:198:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-KW length: 192 using empty derivedKey, empty salt, PBKDF2, with empty info",1,"assert_equals: derivekey with non-digest algorithm correctly threw NotSupportedError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"NotSupportedError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:226:33\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:222:36\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:221:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:214:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:198:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-KW length: 256 using empty derivedKey, empty salt, PBKDF2, with empty info",1,"assert_equals: derivekey with non-digest algorithm correctly threw NotSupportedError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"NotSupportedError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:226:33\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:222:36\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:221:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:214:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:198:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: HMAC hash: SHA-1 length: 256 using empty derivedKey, empty salt, PBKDF2, with empty info",1,"assert_equals: derivekey with non-digest algorithm correctly threw NotSupportedError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"NotSupportedError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:226:33\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:222:36\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:221:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:214:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:198:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: HMAC hash: SHA-256 length: 256 using empty derivedKey, empty salt, PBKDF2, with empty info",1,"assert_equals: derivekey with non-digest algorithm correctly threw NotSupportedError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"NotSupportedError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:226:33\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:222:36\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:221:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:214:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:198:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: HMAC hash: SHA-384 length: 256 using empty derivedKey, empty salt, PBKDF2, with empty info",1,"assert_equals: derivekey with non-digest algorithm correctly threw NotSupportedError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"NotSupportedError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:226:33\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:222:36\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:221:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:214:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:198:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: HMAC hash: SHA-512 length: 256 using empty derivedKey, empty salt, PBKDF2, with empty info",1,"assert_equals: derivekey with non-digest algorithm correctly threw NotSupportedError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"NotSupportedError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:226:33\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:222:36\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:221:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:214:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:198:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"]]]}]
23:28:38 INFO - ............................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
23:28:38 INFO - TEST-OK | /WebCryptoAPI/derive_bits_keys/hkdf.worker | took 15558ms
23:28:38 INFO - PROCESS | 4084 | 1477636118217 Marionette TRACE conn7 -> [0,27,"getWindowHandle",null]
23:28:38 INFO - PROCESS | 4084 | 1477636118222 Marionette TRACE conn7 <- [1,27,null,{"value":"13"}]
23:28:38 INFO - TEST-START | /WebCryptoAPI/derive_bits_keys/test_ecdh_bits.html
23:28:38 INFO - PROCESS | 4084 | 1477636118230 Marionette TRACE conn7 -> [0,28,"timeouts",{"script":185000}]
23:28:38 INFO - PROCESS | 4084 | 1477636118236 Marionette TRACE conn7 <- [1,28,null,{}]
23:28:38 INFO - PROCESS | 4084 | 1477636118244 Marionette TRACE conn7 -> [0,29,"executeScript",{"scriptTimeout":null,"newSandbox":true,"args":[],"filename":"executormarionette.py","script":"if (window.wrappedJSObject.win) {window.wrappedJSObject.win.close()}","sandbox":"default","line":430}]
23:28:38 INFO - PROCESS | 4084 | 1477636118369 Marionette TRACE conn7 <- [1,29,null,{"value":null}]
23:28:38 INFO - PROCESS | 4084 | --DOCSHELL 0000007604DE5800 == 9 [pid = 4084] [id = 13]
23:28:38 INFO - PROCESS | 4084 | 1477636118423 Marionette TRACE conn7 -> [0,30,"getWindowHandles",null]
23:28:38 INFO - PROCESS | 4084 | 1477636118431 Marionette TRACE conn7 <- [1,30,null,["13"]]
23:28:38 INFO - PROCESS | 4084 | 1477636118435 Marionette TRACE conn7 -> [0,31,"switchToWindow",{"name":"13"}]
23:28:38 INFO - PROCESS | 4084 | 1477636118441 Marionette TRACE conn7 <- [1,31,null,{}]
23:28:38 INFO - PROCESS | 4084 | 1477636118450 Marionette TRACE conn7 -> [0,32,"executeAsyncScript",{"scriptTimeout":null,"sandbox":"default","debug_script":false,"script":"/* This Source Code Form is subject to the terms of the Mozilla Public\n * License, v. 2.0. If a copy of the MPL was not distributed with this\n * file, You can obtain one at http://mozilla.org/MPL/2.0/. */\n\nwindow.wrappedJSObject.timeout_multiplier = 3;\nwindow.wrappedJSObject.explicit_timeout = 0;\n\nwindow.wrappedJSObject.addEventListener(\"message\", function listener(event) {\n if (event.data.type != \"complete\") {\n return;\n }\n window.wrappedJSObject.removeEventListener(\"message\", listener);\n clearTimeout(timer);\n var tests = event.data.tests;\n var status = event.data.status;\n\n var subtest_results = tests.map(function(x) {\n return [x.name, x.status, x.message, x.stack]\n });\n\n marionetteScriptFinished([\"/WebCryptoAPI/derive_bits_keys/test_ecdh_bits.html\",\n status.status,\n status.message,\n status.stack,\n subtest_results]);\n}, false);\n\nwindow.wrappedJSObject.win = window.open(\"http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_ecdh_bits.html\", \"9263aebf-3e6f-41f6-9f2e-cdafea6cd8db\");\n\nvar timer = null;\nif (180000) {\n timer = setTimeout(function() {\n log(\"Timeout fired\");\n window.wrappedJSObject.win.timeout();\n }, 180000);\n}\n","newSandbox":false,"line":445,"args":[],"filename":"executormarionette.py"}]
23:28:38 INFO - PROCESS | 4084 | ++DOCSHELL 00000076038D9800 == 10 [pid = 4084] [id = 15]
23:28:38 INFO - PROCESS | 4084 | ++DOMWINDOW == 23 (00000076038DB000) [pid = 4084] [serial = 42] [outer = 0000000000000000]
23:28:38 INFO - PROCESS | 4084 | ++DOMWINDOW == 24 (00000076038E7000) [pid = 4084] [serial = 43] [outer = 00000076038DB000]
23:28:38 INFO - PROCESS | 4084 | 1477636118518 Marionette DEBUG loaded listener.js
23:28:38 INFO - PROCESS | 4084 | ++DOMWINDOW == 25 (0000007603976000) [pid = 4084] [serial = 44] [outer = 00000076038DB000]
23:28:41 INFO - PROCESS | 4084 | --DOMWINDOW == 24 (0000007604DEB000) [pid = 4084] [serial = 35] [outer = 0000000000000000] [url = http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/ecdh_keys.worker]
23:28:45 INFO - PROCESS | 4084 | --DOCSHELL 00000076062B1000 == 9 [pid = 4084] [id = 14]
23:28:45 INFO - PROCESS | 4084 | --DOMWINDOW == 23 (0000007605B14000) [pid = 4084] [serial = 37] [outer = 0000000000000000] [url = about:blank]
23:28:45 INFO - PROCESS | 4084 | --DOMWINDOW == 22 (00000076068B0000) [pid = 4084] [serial = 40] [outer = 0000000000000000] [url = about:blank]
23:28:48 INFO - PROCESS | 4084 | --DOMWINDOW == 21 (00000076062B3800) [pid = 4084] [serial = 39] [outer = 0000000000000000] [url = http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker]
23:28:52 INFO - PROCESS | 4084 | ++DOMWINDOW == 22 (0000007602B0E000) [pid = 4084] [serial = 45] [outer = 0000007606D53000]
23:28:53 INFO - PROCESS | 4084 | --DOMWINDOW == 21 (0000007606D45000) [pid = 4084] [serial = 41] [outer = 0000000000000000] [url = about:blank]
23:28:53 INFO - PROCESS | 4084 | --DOMWINDOW == 20 (00000076038E7000) [pid = 4084] [serial = 43] [outer = 0000000000000000] [url = about:blank]
23:30:22 INFO - PROCESS | 4084 | ++DOMWINDOW == 21 (00000076038E3800) [pid = 4084] [serial = 46] [outer = 0000007606D53000]
23:30:37 INFO - PROCESS | 4084 | --DOMWINDOW == 20 (0000007602B0E000) [pid = 4084] [serial = 45] [outer = 0000000000000000] [url = about:neterror?e=dnsNotFound&u=https%3A//%25%28server%29s/selfsupport-dummy/&c=UTF-8&f=regular&d=Firefox%20can%E2%80%99t%20find%20the%20server%20at%20%25%28server%29s.]
23:30:37 INFO - PROCESS | 4084 | --DOMWINDOW == 19 (0000007606959000) [pid = 4084] [serial = 38] [outer = 0000000000000000] [url = about:neterror?e=dnsNotFound&u=https%3A//%25%28server%29s/selfsupport-dummy/&c=UTF-8&f=regular&d=Firefox%20can%E2%80%99t%20find%20the%20server%20at%20%25%28server%29s.]
23:31:38 INFO - PROCESS | 4084 | MARIONETTE LOG: INFO: Timeout fired
23:31:38 INFO - PROCESS | 4084 | 1477636298784 Marionette TRACE conn7 <- [1,32,null,{"value":["/WebCryptoAPI/derive_bits_keys/test_ecdh_bits.html",2,null,null,[]]}]
23:31:38 INFO - TEST-TIMEOUT | /WebCryptoAPI/derive_bits_keys/test_ecdh_bits.html | took 180568ms
23:31:38 INFO - PROCESS | 4084 | 1477636298831 Marionette TRACE conn7 -> [0,33,"getWindowHandle",null]
23:31:38 INFO - PROCESS | 4084 | 1477636298837 Marionette TRACE conn7 <- [1,33,null,{"value":"13"}]
23:31:38 INFO - PROCESS | 4084 | 1477636298847 Marionette TRACE conn7 -> [0,34,"executeScript",{"scriptTimeout":null,"newSandbox":true,"args":[],"filename":"executormarionette.py","script":"if (window.wrappedJSObject.win) {window.wrappedJSObject.win.close()}","sandbox":"default","line":430}]
23:31:38 INFO - TEST-START | /WebCryptoAPI/derive_bits_keys/test_ecdh_keys.html
23:31:39 INFO - PROCESS | 4084 | 1477636299022 Marionette TRACE conn7 <- [1,34,null,{"value":null}]
23:31:39 INFO - PROCESS | 4084 | 1477636299053 Marionette TRACE conn7 -> [0,35,"getWindowHandles",null]
23:31:39 INFO - PROCESS | 4084 | 1477636299058 Marionette TRACE conn7 <- [1,35,null,["13"]]
23:31:39 INFO - PROCESS | 4084 | 1477636299063 Marionette TRACE conn7 -> [0,36,"switchToWindow",{"name":"13"}]
23:31:39 INFO - PROCESS | 4084 | 1477636299071 Marionette TRACE conn7 <- [1,36,null,{}]
23:31:39 INFO - PROCESS | 4084 | 1477636299076 Marionette TRACE conn7 -> [0,37,"executeAsyncScript",{"scriptTimeout":null,"sandbox":"default","debug_script":false,"script":"/* This Source Code Form is subject to the terms of the Mozilla Public\n * License, v. 2.0. If a copy of the MPL was not distributed with this\n * file, You can obtain one at http://mozilla.org/MPL/2.0/. */\n\nwindow.wrappedJSObject.timeout_multiplier = 3;\nwindow.wrappedJSObject.explicit_timeout = 0;\n\nwindow.wrappedJSObject.addEventListener(\"message\", function listener(event) {\n if (event.data.type != \"complete\") {\n return;\n }\n window.wrappedJSObject.removeEventListener(\"message\", listener);\n clearTimeout(timer);\n var tests = event.data.tests;\n var status = event.data.status;\n\n var subtest_results = tests.map(function(x) {\n return [x.name, x.status, x.message, x.stack]\n });\n\n marionetteScriptFinished([\"/WebCryptoAPI/derive_bits_keys/test_ecdh_keys.html\",\n status.status,\n status.message,\n status.stack,\n subtest_results]);\n}, false);\n\nwindow.wrappedJSObject.win = window.open(\"http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_ecdh_keys.html\", \"9263aebf-3e6f-41f6-9f2e-cdafea6cd8db\");\n\nvar timer = null;\nif (180000) {\n timer = setTimeout(function() {\n log(\"Timeout fired\");\n window.wrappedJSObject.win.timeout();\n }, 180000);\n}\n","newSandbox":false,"line":445,"args":[],"filename":"executormarionette.py"}]
23:31:39 INFO - PROCESS | 4084 | ++DOCSHELL 000000760397D000 == 10 [pid = 4084] [id = 16]
23:31:39 INFO - PROCESS | 4084 | ++DOMWINDOW == 20 (000000760397D800) [pid = 4084] [serial = 47] [outer = 0000000000000000]
23:31:39 INFO - PROCESS | 4084 | ++DOMWINDOW == 21 (0000007603982800) [pid = 4084] [serial = 48] [outer = 000000760397D800]
23:31:39 INFO - PROCESS | 4084 | 1477636299152 Marionette DEBUG loaded listener.js
23:31:39 INFO - PROCESS | 4084 | ++DOMWINDOW == 22 (0000007603990800) [pid = 4084] [serial = 49] [outer = 000000760397D800]
23:32:22 INFO - PROCESS | 4084 | ++DOMWINDOW == 23 (00000076038F2000) [pid = 4084] [serial = 50] [outer = 0000007606D53000]
23:32:32 INFO - PROCESS | 4084 | --DOCSHELL 00000076038D9800 == 9 [pid = 4084] [id = 15]
23:32:34 INFO - PROCESS | 4084 | --DOMWINDOW == 22 (00000076038DB000) [pid = 4084] [serial = 42] [outer = 0000000000000000] [url = http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_ecdh_bits.html]
23:32:39 INFO - PROCESS | 4084 | --DOMWINDOW == 21 (0000007603976000) [pid = 4084] [serial = 44] [outer = 0000000000000000] [url = about:blank]
23:32:39 INFO - PROCESS | 4084 | --DOMWINDOW == 20 (00000076038E3800) [pid = 4084] [serial = 46] [outer = 0000000000000000] [url = about:neterror?e=dnsNotFound&u=https%3A//%25%28server%29s/selfsupport-dummy/&c=UTF-8&f=regular&d=Firefox%20can%E2%80%99t%20find%20the%20server%20at%20%25%28server%29s.]
23:32:39 INFO - PROCESS | 4084 | --DOMWINDOW == 19 (0000007603982800) [pid = 4084] [serial = 48] [outer = 0000000000000000] [url = about:blank]
23:34:39 INFO - PROCESS | 4084 | MARIONETTE LOG: INFO: Timeout fired
23:34:39 INFO - PROCESS | 4084 | 1477636479381 Marionette TRACE conn7 <- [1,37,null,{"value":["/WebCryptoAPI/derive_bits_keys/test_ecdh_keys.html",2,null,null,[]]}]
23:34:39 INFO - TEST-TIMEOUT | /WebCryptoAPI/derive_bits_keys/test_ecdh_keys.html | took 180577ms
23:34:39 INFO - PROCESS | 4084 | 1477636479431 Marionette TRACE conn7 -> [0,38,"getWindowHandle",null]
23:34:39 INFO - PROCESS | 4084 | 1477636479436 Marionette TRACE conn7 <- [1,38,null,{"value":"13"}]
23:34:39 INFO - TEST-START | /WebCryptoAPI/derive_bits_keys/test_hkdf.html
23:34:39 INFO - PROCESS | 4084 | 1477636479475 Marionette TRACE conn7 -> [0,39,"executeScript",{"scriptTimeout":null,"newSandbox":true,"args":[],"filename":"executormarionette.py","script":"if (window.wrappedJSObject.win) {window.wrappedJSObject.win.close()}","sandbox":"default","line":430}]
23:34:39 INFO - PROCESS | 4084 | 1477636479619 Marionette TRACE conn7 <- [1,39,null,{"value":null}]
23:34:39 INFO - PROCESS | 4084 | 1477636479649 Marionette TRACE conn7 -> [0,40,"getWindowHandles",null]
23:34:39 INFO - PROCESS | 4084 | 1477636479653 Marionette TRACE conn7 <- [1,40,null,["13"]]
23:34:39 INFO - PROCESS | 4084 | 1477636479659 Marionette TRACE conn7 -> [0,41,"switchToWindow",{"name":"13"}]
23:34:39 INFO - PROCESS | 4084 | 1477636479666 Marionette TRACE conn7 <- [1,41,null,{}]
23:34:39 INFO - PROCESS | 4084 | 1477636479670 Marionette TRACE conn7 -> [0,42,"executeAsyncScript",{"scriptTimeout":null,"sandbox":"default","debug_script":false,"script":"/* This Source Code Form is subject to the terms of the Mozilla Public\n * License, v. 2.0. If a copy of the MPL was not distributed with this\n * file, You can obtain one at http://mozilla.org/MPL/2.0/. */\n\nwindow.wrappedJSObject.timeout_multiplier = 3;\nwindow.wrappedJSObject.explicit_timeout = 0;\n\nwindow.wrappedJSObject.addEventListener(\"message\", function listener(event) {\n if (event.data.type != \"complete\") {\n return;\n }\n window.wrappedJSObject.removeEventListener(\"message\", listener);\n clearTimeout(timer);\n var tests = event.data.tests;\n var status = event.data.status;\n\n var subtest_results = tests.map(function(x) {\n return [x.name, x.status, x.message, x.stack]\n });\n\n marionetteScriptFinished([\"/WebCryptoAPI/derive_bits_keys/test_hkdf.html\",\n status.status,\n status.message,\n status.stack,\n subtest_results]);\n}, false);\n\nwindow.wrappedJSObject.win = window.open(\"http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html\", \"9263aebf-3e6f-41f6-9f2e-cdafea6cd8db\");\n\nvar timer = null;\nif (180000) {\n timer = setTimeout(function() {\n log(\"Timeout fired\");\n window.wrappedJSObject.win.timeout();\n }, 180000);\n}\n","newSandbox":false,"line":445,"args":[],"filename":"executormarionette.py"}]
23:34:39 INFO - PROCESS | 4084 | ++DOCSHELL 00000076038F1000 == 10 [pid = 4084] [id = 17]
23:34:39 INFO - PROCESS | 4084 | ++DOMWINDOW == 20 (0000007603961800) [pid = 4084] [serial = 51] [outer = 0000000000000000]
23:34:39 INFO - PROCESS | 4084 | ++DOMWINDOW == 21 (0000007603967000) [pid = 4084] [serial = 52] [outer = 0000007603961800]
23:34:39 INFO - PROCESS | 4084 | 1477636479736 Marionette DEBUG loaded listener.js
23:34:39 INFO - PROCESS | 4084 | ++DOMWINDOW == 22 (0000007603976000) [pid = 4084] [serial = 53] [outer = 0000007603961800]
23:34:52 INFO - PROCESS | 4084 | 1477636491016 Marionette TRACE conn7 <- [1,42,null,{"value":["/WebCryptoAPI/derive_bits_keys/test_hkdf.html",0,null,null,[["short derivedKey, normal salt, SHA-384, with normal info",0,null,null],["short derivedKey, normal salt, SHA-384, with normal info with 0 length",1,"assert_equals: deriveBits with 0 length correctly threw OperationError: Data provided to an operation does not meet requirements expected \"OperationError\" but got \"DataError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:54:33\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:50:36\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:49:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-CBC length: 128 using short derivedKey, normal salt, SHA-384, with normal info",0,null,null],["Derived key of type name: AES-CBC length: 128 using short derivedKey, normal salt, SHA-384, with normal info with bad hash name SHA384",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-CBC length: 128 using short derivedKey, normal salt, SHA-384, with normal info with missing deriveKey usage",0,null,null],["Derived key of type name: AES-CBC length: 128 using short derivedKey, normal salt, SHA-384, with normal info with wrong (ECDH) key",0,null,null],["Derived key of type name: AES-CBC length: 192 using short derivedKey, normal salt, SHA-384, with normal info",0,null,null],["Derived key of type name: AES-CBC length: 192 using short derivedKey, normal salt, SHA-384, with normal info with bad hash name SHA384",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-CBC length: 192 using short derivedKey, normal salt, SHA-384, with normal info with missing deriveKey usage",0,null,null],["Derived key of type name: AES-CBC length: 192 using short derivedKey, normal salt, SHA-384, with normal info with wrong (ECDH) key",0,null,null],["Derived key of type name: AES-CBC length: 256 using short derivedKey, normal salt, SHA-384, with normal info",0,null,null],["Derived key of type name: AES-CBC length: 256 using short derivedKey, normal salt, SHA-384, with normal info with bad hash name SHA384",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-CBC length: 256 using short derivedKey, normal salt, SHA-384, with normal info with missing deriveKey usage",0,null,null],["Derived key of type name: AES-CBC length: 256 using short derivedKey, normal salt, SHA-384, with normal info with wrong (ECDH) key",0,null,null],["Derived key of type name: AES-CTR length: 128 using short derivedKey, normal salt, SHA-384, with normal info",0,null,null],["Derived key of type name: AES-CTR length: 128 using short derivedKey, normal salt, SHA-384, with normal info with bad hash name SHA384",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-CTR length: 128 using short derivedKey, normal salt, SHA-384, with normal info with missing deriveKey usage",0,null,null],["Derived key of type name: AES-CTR length: 128 using short derivedKey, normal salt, SHA-384, with normal info with wrong (ECDH) key",0,null,null],["Derived key of type name: AES-CTR length: 192 using short derivedKey, normal salt, SHA-384, with normal info",0,null,null],["Derived key of type name: AES-CTR length: 192 using short derivedKey, normal salt, SHA-384, with normal info with bad hash name SHA384",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-CTR length: 192 using short derivedKey, normal salt, SHA-384, with normal info with missing deriveKey usage",0,null,null],["Derived key of type name: AES-CTR length: 192 using short derivedKey, normal salt, SHA-384, with normal info with wrong (ECDH) key",0,null,null],["Derived key of type name: AES-CTR length: 256 using short derivedKey, normal salt, SHA-384, with normal info",0,null,null],["Derived key of type name: AES-CTR length: 256 using short derivedKey, normal salt, SHA-384, with normal info with bad hash name SHA384",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-CTR length: 256 using short derivedKey, normal salt, SHA-384, with normal info with missing deriveKey usage",0,null,null],["Derived key of type name: AES-CTR length: 256 using short derivedKey, normal salt, SHA-384, with normal info with wrong (ECDH) key",0,null,null],["Derived key of type name: AES-GCM length: 128 using short derivedKey, normal salt, SHA-384, with normal info",0,null,null],["Derived key of type name: AES-GCM length: 128 using short derivedKey, normal salt, SHA-384, with normal info with bad hash name SHA384",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-GCM length: 128 using short derivedKey, normal salt, SHA-384, with normal info with missing deriveKey usage",0,null,null],["Derived key of type name: AES-GCM length: 128 using short derivedKey, normal salt, SHA-384, with normal info with wrong (ECDH) key",0,null,null],["Derived key of type name: AES-GCM length: 192 using short derivedKey, normal salt, SHA-384, with normal info",0,null,null],["Derived key of type name: AES-GCM length: 192 using short derivedKey, normal salt, SHA-384, with normal info with bad hash name SHA384",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-GCM length: 192 using short derivedKey, normal salt, SHA-384, with normal info with missing deriveKey usage",0,null,null],["Derived key of type name: AES-GCM length: 192 using short derivedKey, normal salt, SHA-384, with normal info with wrong (ECDH) key",0,null,null],["Derived key of type name: AES-GCM length: 256 using short derivedKey, normal salt, SHA-384, with normal info",0,null,null],["Derived key of type name: AES-GCM length: 256 using short derivedKey, normal salt, SHA-384, with normal info with bad hash name SHA384",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-GCM length: 256 using short derivedKey, normal salt, SHA-384, with normal info with missing deriveKey usage",0,null,null],["Derived key of type name: AES-GCM length: 256 using short derivedKey, normal salt, SHA-384, with normal info with wrong (ECDH) key",0,null,null],["Derived key of type name: AES-KW length: 128 using short derivedKey, normal salt, SHA-384, with normal info",0,null,null],["Derived key of type name: AES-KW length: 128 using short derivedKey, normal salt, SHA-384, with normal info with bad hash name SHA384",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-KW length: 128 using short derivedKey, normal salt, SHA-384, with normal info with missing deriveKey usage",0,null,null],["Derived key of type name: AES-KW length: 128 using short derivedKey, normal salt, SHA-384, with normal info with wrong (ECDH) key",0,null,null],["Derived key of type name: AES-KW length: 192 using short derivedKey, normal salt, SHA-384, with normal info",0,null,null],["Derived key of type name: AES-KW length: 192 using short derivedKey, normal salt, SHA-384, with normal info with bad hash name SHA384",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-KW length: 192 using short derivedKey, normal salt, SHA-384, with normal info with missing deriveKey usage",0,null,null],["Derived key of type name: AES-KW length: 192 using short derivedKey, normal salt, SHA-384, with normal info with wrong (ECDH) key",0,null,null],["Derived key of type name: AES-KW length: 256 using short derivedKey, normal salt, SHA-384, with normal info",0,null,null],["Derived key of type name: AES-KW length: 256 using short derivedKey, normal salt, SHA-384, with normal info with bad hash name SHA384",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-KW length: 256 using short derivedKey, normal salt, SHA-384, with normal info with missing deriveKey usage",0,null,null],["Derived key of type name: AES-KW length: 256 using short derivedKey, normal salt, SHA-384, with normal info with wrong (ECDH) key",0,null,null],["Derived key of type name: HMAC hash: SHA-1 length: 256 using short derivedKey, normal salt, SHA-384, with normal info",0,null,null],["Derived key of type name: HMAC hash: SHA-1 length: 256 using short derivedKey, normal salt, SHA-384, with normal info with bad hash name SHA384",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: HMAC hash: SHA-1 length: 256 using short derivedKey, normal salt, SHA-384, with normal info with missing deriveKey usage",0,null,null],["Derived key of type name: HMAC hash: SHA-1 length: 256 using short derivedKey, normal salt, SHA-384, with normal info with wrong (ECDH) key",0,null,null],["Derived key of type name: HMAC hash: SHA-256 length: 256 using short derivedKey, normal salt, SHA-384, with normal info",0,null,null],["Derived key of type name: HMAC hash: SHA-256 length: 256 using short derivedKey, normal salt, SHA-384, with normal info with bad hash name SHA384",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: HMAC hash: SHA-256 length: 256 using short derivedKey, normal salt, SHA-384, with normal info with missing deriveKey usage",0,null,null],["Derived key of type name: HMAC hash: SHA-256 length: 256 using short derivedKey, normal salt, SHA-384, with normal info with wrong (ECDH) key",0,null,null],["Derived key of type name: HMAC hash: SHA-384 length: 256 using short derivedKey, normal salt, SHA-384, with normal info",0,null,null],["Derived key of type name: HMAC hash: SHA-384 length: 256 using short derivedKey, normal salt, SHA-384, with normal info with bad hash name SHA384",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: HMAC hash: SHA-384 length: 256 using short derivedKey, normal salt, SHA-384, with normal info with missing deriveKey usage",0,null,null],["Derived key of type name: HMAC hash: SHA-384 length: 256 using short derivedKey, normal salt, SHA-384, with normal info with wrong (ECDH) key",0,null,null],["Derived key of type name: HMAC hash: SHA-512 length: 256 using short derivedKey, normal salt, SHA-384, with normal info",0,null,null],["Derived key of type name: HMAC hash: SHA-512 length: 256 using short derivedKey, normal salt, SHA-384, with normal info with bad hash name SHA384",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: HMAC hash: SHA-512 length: 256 using short derivedKey, normal salt, SHA-384, with normal info with missing deriveKey usage",0,null,null],["Derived key of type name: HMAC hash: SHA-512 length: 256 using short derivedKey, normal salt, SHA-384, with normal info with wrong (ECDH) key",0,null,null],["short derivedKey, normal salt, SHA-384, with normal info with missing salt",1,"assert_equals: deriveBits missing salt correctly threw OperationError: An invalid or illegal string was specified expected \"TypeError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:128:33\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:124:36\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:123:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["short derivedKey, normal salt, SHA-384, with normal info with missing info",1,"assert_equals: deriveBits missing info correctly threw OperationError: An invalid or illegal string was specified expected \"TypeError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:138:33\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:134:36\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:133:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["short derivedKey, normal salt, SHA-384, with normal info with null length",1,"assert_equals: deriveBits with null length correctly threw OperationError: Data provided to an operation does not meet requirements expected \"TypeError\" but got \"DataError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:148:33\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:144:36\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:143:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["short derivedKey, normal salt, SHA-384, with normal info with non-multiple of 8 length",1,"assert_unreached: non-multiple of 8 length should have thrown an OperationError Reached unreachable code","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:156:33\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:154:36\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:153:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["short derivedKey, normal salt, SHA-384, with normal info with bad hash name SHA384",1,"assert_equals: deriveBits with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:170:33\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:166:36\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:164:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["short derivedKey, normal salt, SHA-384, with normal info with missing deriveBits usage",0,null,null],["short derivedKey, normal salt, SHA-384, with normal info with wrong (ECDH) key",0,null,null],["short derivedKey, normal salt, SHA-384, with empty info",0,null,null],["short derivedKey, normal salt, SHA-384, with empty info with 0 length",1,"assert_equals: deriveBits with 0 length correctly threw OperationError: Data provided to an operation does not meet requirements expected \"OperationError\" but got \"DataError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:54:33\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:50:36\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:49:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-CBC length: 128 using short derivedKey, normal salt, SHA-384, with empty info",0,null,null],["Derived key of type name: AES-CBC length: 128 using short derivedKey, normal salt, SHA-384, with empty info with bad hash name SHA384",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-CBC length: 128 using short derivedKey, normal salt, SHA-384, with empty info with missing deriveKey usage",0,null,null],["Derived key of type name: AES-CBC length: 128 using short derivedKey, normal salt, SHA-384, with empty info with wrong (ECDH) key",0,null,null],["Derived key of type name: AES-CBC length: 192 using short derivedKey, normal salt, SHA-384, with empty info",0,null,null],["Derived key of type name: AES-CBC length: 192 using short derivedKey, normal salt, SHA-384, with empty info with bad hash name SHA384",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-CBC length: 192 using short derivedKey, normal salt, SHA-384, with empty info with missing deriveKey usage",0,null,null],["Derived key of type name: AES-CBC length: 192 using short derivedKey, normal salt, SHA-384, with empty info with wrong (ECDH) key",0,null,null],["Derived key of type name: AES-CBC length: 256 using short derivedKey, normal salt, SHA-384, with empty info",0,null,null],["Derived key of type name: AES-CBC length: 256 using short derivedKey, normal salt, SHA-384, with empty info with bad hash name SHA384",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-CBC length: 256 using short derivedKey, normal salt, SHA-384, with empty info with missing deriveKey usage",0,null,null],["Derived key of type name: AES-CBC length: 256 using short derivedKey, normal salt, SHA-384, with empty info with wrong (ECDH) key",0,null,null],["Derived key of type name: AES-CTR length: 128 using short derivedKey, normal salt, SHA-384, with empty info",0,null,null],["Derived key of type name: AES-CTR length: 128 using short derivedKey, normal salt, SHA-384, with empty info with bad hash name SHA384",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-CTR length: 128 using short derivedKey, normal salt, SHA-384, with empty info with missing deriveKey usage",0,null,null],["Derived key of type name: AES-CTR length: 128 using short derivedKey, normal salt, SHA-384, with empty info with wrong (ECDH) key",0,null,null],["Derived key of type name: AES-CTR length: 192 using short derivedKey, normal salt, SHA-384, with empty info",0,null,null],["Derived key of type name: AES-CTR length: 192 using short derivedKey, normal salt, SHA-384, with empty info with bad hash name SHA384",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-CTR length: 192 using short derivedKey, normal salt, SHA-384, with empty info with missing deriveKey usage",0,null,null],["Derived key of type name: AES-CTR length: 192 using short derivedKey, normal salt, SHA-384, with empty info with wrong (ECDH) key",0,null,null],["Derived key of type name: AES-CTR length: 256 using short derivedKey, normal salt, SHA-384, with empty info",0,null,null],["Derived key of type name: AES-CTR length: 256 using short derivedKey, normal salt, SHA-384, with empty info with bad hash name SHA384",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-CTR length: 256 using short derivedKey, normal salt, SHA-384, with empty info with missing deriveKey usage",0,null,null],["Derived key of type name: AES-CTR length: 256 using short derivedKey, normal salt, SHA-384, with empty info with wrong (ECDH) key",0,null,null],["Derived key of type name: AES-GCM length: 128 using short derivedKey, normal salt, SHA-384, with empty info",0,null,null],["Derived key of type name: AES-GCM length: 128 using short derivedKey, normal salt, SHA-384, with empty info with bad hash name SHA384",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-GCM length: 128 using short derivedKey, normal salt, SHA-384, with empty info with missing deriveKey usage",0,null,null],["Derived key of type name: AES-GCM length: 128 using short derivedKey, normal salt, SHA-384, with empty info with wrong (ECDH) key",0,null,null],["Derived key of type name: AES-GCM length: 192 using short derivedKey, normal salt, SHA-384, with empty info",0,null,null],["Derived key of type name: AES-GCM length: 192 using short derivedKey, normal salt, SHA-384, with empty info with bad hash name SHA384",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-GCM length: 192 using short derivedKey, normal salt, SHA-384, with empty info with missing deriveKey usage",0,null,null],["Derived key of type name: AES-GCM length: 192 using short derivedKey, normal salt, SHA-384, with empty info with wrong (ECDH) key",0,null,null],["Derived key of type name: AES-GCM length: 256 using short derivedKey, normal salt, SHA-384, with empty info",0,null,null],["Derived key of type name: AES-GCM length: 256 using short derivedKey, normal salt, SHA-384, with empty info with bad hash name SHA384",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-GCM length: 256 using short derivedKey, normal salt, SHA-384, with empty info with missing deriveKey usage",0,null,null],["Derived key of type name: AES-GCM length: 256 using short derivedKey, normal salt, SHA-384, with empty info with wrong (ECDH) key",0,null,null],["Derived key of type name: AES-KW length: 128 using short derivedKey, normal salt, SHA-384, with empty info",0,null,null],["Derived key of type name: AES-KW length: 128 using short derivedKey, normal salt, SHA-384, with empty info with bad hash name SHA384",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-KW length: 128 using short derivedKey, normal salt, SHA-384, with empty info with missing deriveKey usage",0,null,null],["Derived key of type name: AES-KW length: 128 using short derivedKey, normal salt, SHA-384, with empty info with wrong (ECDH) key",0,null,null],["Derived key of type name: AES-KW length: 192 using short derivedKey, normal salt, SHA-384, with empty info",0,null,null],["Derived key of type name: AES-KW length: 192 using short derivedKey, normal salt, SHA-384, with empty info with bad hash name SHA384",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-KW length: 192 using short derivedKey, normal salt, SHA-384, with empty info with missing deriveKey usage",0,null,null],["Derived key of type name: AES-KW length: 192 using short derivedKey, normal salt, SHA-384, with empty info with wrong (ECDH) key",0,null,null],["Derived key of type name: AES-KW length: 256 using short derivedKey, normal salt, SHA-384, with empty info",0,null,null],["Derived key of type name: AES-KW length: 256 using short derivedKey, normal salt, SHA-384, with empty info with bad hash name SHA384",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-KW length: 256 using short derivedKey, normal salt, SHA-384, with empty info with missing deriveKey usage",0,null,null],["Derived key of type name: AES-KW length: 256 using short derivedKey, normal salt, SHA-384, with empty info with wrong (ECDH) key",0,null,null],["Derived key of type name: HMAC hash: SHA-1 length: 256 using short derivedKey, normal salt, SHA-384, with empty info",0,null,null],["Derived key of type name: HMAC hash: SHA-1 length: 256 using short derivedKey, normal salt, SHA-384, with empty info with bad hash name SHA384",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: HMAC hash: SHA-1 length: 256 using short derivedKey, normal salt, SHA-384, with empty info with missing deriveKey usage",0,null,null],["Derived key of type name: HMAC hash: SHA-1 length: 256 using short derivedKey, normal salt, SHA-384, with empty info with wrong (ECDH) key",0,null,null],["Derived key of type name: HMAC hash: SHA-256 length: 256 using short derivedKey, normal salt, SHA-384, with empty info",0,null,null],["Derived key of type name: HMAC hash: SHA-256 length: 256 using short derivedKey, normal salt, SHA-384, with empty info with bad hash name SHA384",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: HMAC hash: SHA-256 length: 256 using short derivedKey, normal salt, SHA-384, with empty info with missing deriveKey usage",0,null,null],["Derived key of type name: HMAC hash: SHA-256 length: 256 using short derivedKey, normal salt, SHA-384, with empty info with wrong (ECDH) key",0,null,null],["Derived key of type name: HMAC hash: SHA-384 length: 256 using short derivedKey, normal salt, SHA-384, with empty info",0,null,null],["Derived key of type name: HMAC hash: SHA-384 length: 256 using short derivedKey, normal salt, SHA-384, with empty info with bad hash name SHA384",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: HMAC hash: SHA-384 length: 256 using short derivedKey, normal salt, SHA-384, with empty info with missing deriveKey usage",0,null,null],["Derived key of type name: HMAC hash: SHA-384 length: 256 using short derivedKey, normal salt, SHA-384, with empty info with wrong (ECDH) key",0,null,null],["Derived key of type name: HMAC hash: SHA-512 length: 256 using short derivedKey, normal salt, SHA-384, with empty info",0,null,null],["Derived key of type name: HMAC hash: SHA-512 length: 256 using short derivedKey, normal salt, SHA-384, with empty info with bad hash name SHA384",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: HMAC hash: SHA-512 length: 256 using short derivedKey, normal salt, SHA-384, with empty info with missing deriveKey usage",0,null,null],["Derived key of type name: HMAC hash: SHA-512 length: 256 using short derivedKey, normal salt, SHA-384, with empty info with wrong (ECDH) key",0,null,null],["short derivedKey, normal salt, SHA-384, with empty info with missing salt",1,"assert_equals: deriveBits missing salt correctly threw OperationError: An invalid or illegal string was specified expected \"TypeError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:128:33\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:124:36\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:123:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["short derivedKey, normal salt, SHA-384, with empty info with missing info",1,"assert_equals: deriveBits missing info correctly threw OperationError: An invalid or illegal string was specified expected \"TypeError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:138:33\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:134:36\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:133:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["short derivedKey, normal salt, SHA-384, with empty info with null length",1,"assert_equals: deriveBits with null length correctly threw OperationError: Data provided to an operation does not meet requirements expected \"TypeError\" but got \"DataError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:148:33\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:144:36\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:143:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["short derivedKey, normal salt, SHA-384, with empty info with non-multiple of 8 length",1,"assert_unreached: non-multiple of 8 length should have thrown an OperationError Reached unreachable code","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:156:33\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:154:36\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:153:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["short derivedKey, normal salt, SHA-384, with empty info with bad hash name SHA384",1,"assert_equals: deriveBits with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:170:33\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:166:36\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:164:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["short derivedKey, normal salt, SHA-384, with empty info with missing deriveBits usage",0,null,null],["short derivedKey, normal salt, SHA-384, with empty info with wrong (ECDH) key",0,null,null],["short derivedKey, normal salt, SHA-512, with normal info",0,null,null],["short derivedKey, normal salt, SHA-512, with normal info with 0 length",1,"assert_equals: deriveBits with 0 length correctly threw OperationError: Data provided to an operation does not meet requirements expected \"OperationError\" but got \"DataError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:54:33\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:50:36\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:49:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-CBC length: 128 using short derivedKey, normal salt, SHA-512, with normal info",0,null,null],["Derived key of type name: AES-CBC length: 128 using short derivedKey, normal salt, SHA-512, with normal info with bad hash name SHA512",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-CBC length: 128 using short derivedKey, normal salt, SHA-512, with normal info with missing deriveKey usage",0,null,null],["Derived key of type name: AES-CBC length: 128 using short derivedKey, normal salt, SHA-512, with normal info with wrong (ECDH) key",0,null,null],["Derived key of type name: AES-CBC length: 192 using short derivedKey, normal salt, SHA-512, with normal info",0,null,null],["Derived key of type name: AES-CBC length: 192 using short derivedKey, normal salt, SHA-512, with normal info with bad hash name SHA512",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-CBC length: 192 using short derivedKey, normal salt, SHA-512, with normal info with missing deriveKey usage",0,null,null],["Derived key of type name: AES-CBC length: 192 using short derivedKey, normal salt, SHA-512, with normal info with wrong (ECDH) key",0,null,null],["Derived key of type name: AES-CBC length: 256 using short derivedKey, normal salt, SHA-512, with normal info",0,null,null],["Derived key of type name: AES-CBC length: 256 using short derivedKey, normal salt, SHA-512, with normal info with bad hash name SHA512",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-CBC length: 256 using short derivedKey, normal salt, SHA-512, with normal info with missing deriveKey usage",0,null,null],["Derived key of type name: AES-CBC length: 256 using short derivedKey, normal salt, SHA-512, with normal info with wrong (ECDH) key",0,null,null],["Derived key of type name: AES-CTR length: 128 using short derivedKey, normal salt, SHA-512, with normal info",0,null,null],["Derived key of type name: AES-CTR length: 128 using short derivedKey, normal salt, SHA-512, with normal info with bad hash name SHA512",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-CTR length: 128 using short derivedKey, normal salt, SHA-512, with normal info with missing deriveKey usage",0,null,null],["Derived key of type name: AES-CTR length: 128 using short derivedKey, normal salt, SHA-512, with normal info with wrong (ECDH) key",0,null,null],["Derived key of type name: AES-CTR length: 192 using short derivedKey, normal salt, SHA-512, with normal info",0,null,null],["Derived key of type name: AES-CTR length: 192 using short derivedKey, normal salt, SHA-512, with normal info with bad hash name SHA512",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-CTR length: 192 using short derivedKey, normal salt, SHA-512, with normal info with missing deriveKey usage",0,null,null],["Derived key of type name: AES-CTR length: 192 using short derivedKey, normal salt, SHA-512, with normal info with wrong (ECDH) key",0,null,null],["Derived key of type name: AES-CTR length: 256 using short derivedKey, normal salt, SHA-512, with normal info",0,null,null],["Derived key of type name: AES-CTR length: 256 using short derivedKey, normal salt, SHA-512, with normal info with bad hash name SHA512",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-CTR length: 256 using short derivedKey, normal salt, SHA-512, with normal info with missing deriveKey usage",0,null,null],["Derived key of type name: AES-CTR length: 256 using short derivedKey, normal salt, SHA-512, with normal info with wrong (ECDH) key",0,null,null],["Derived key of type name: AES-GCM length: 128 using short derivedKey, normal salt, SHA-512, with normal info",0,null,null],["Derived key of type name: AES-GCM length: 128 using short derivedKey, normal salt, SHA-512, with normal info with bad hash name SHA512",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-GCM length: 128 using short derivedKey, normal salt, SHA-512, with normal info with missing deriveKey usage",0,null,null],["Derived key of type name: AES-GCM length: 128 using short derivedKey, normal salt, SHA-512, with normal info with wrong (ECDH) key",0,null,null],["Derived key of type name: AES-GCM length: 192 using short derivedKey, normal salt, SHA-512, with normal info",0,null,null],["Derived key of type name: AES-GCM length: 192 using short derivedKey, normal salt, SHA-512, with normal info with bad hash name SHA512",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-GCM length: 192 using short derivedKey, normal salt, SHA-512, with normal info with missing deriveKey usage",0,null,null],["Derived key of type name: AES-GCM length: 192 using short derivedKey, normal salt, SHA-512, with normal info with wrong (ECDH) key",0,null,null],["Derived key of type name: AES-GCM length: 256 using short derivedKey, normal salt, SHA-512, with normal info",0,null,null],["Derived key of type name: AES-GCM length: 256 using short derivedKey, normal salt, SHA-512, with normal info with bad hash name SHA512",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-GCM length: 256 using short derivedKey, normal salt, SHA-512, with normal info with missing deriveKey usage",0,null,null],["Derived key of type name: AES-GCM length: 256 using short derivedKey, normal salt, SHA-512, with normal info with wrong (ECDH) key",0,null,null],["Derived key of type name: AES-KW length: 128 using short derivedKey, normal salt, SHA-512, with normal info",0,null,null],["Derived key of type name: AES-KW length: 128 using short derivedKey, normal salt, SHA-512, with normal info with bad hash name SHA512",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-KW length: 128 using short derivedKey, normal salt, SHA-512, with normal info with missing deriveKey usage",0,null,null],["Derived key of type name: AES-KW length: 128 using short derivedKey, normal salt, SHA-512, with normal info with wrong (ECDH) key",0,null,null],["Derived key of type name: AES-KW length: 192 using short derivedKey, normal salt, SHA-512, with normal info",0,null,null],["Derived key of type name: AES-KW length: 192 using short derivedKey, normal salt, SHA-512, with normal info with bad hash name SHA512",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-KW length: 192 using short derivedKey, normal salt, SHA-512, with normal info with missing deriveKey usage",0,null,null],["Derived key of type name: AES-KW length: 192 using short derivedKey, normal salt, SHA-512, with normal info with wrong (ECDH) key",0,null,null],["Derived key of type name: AES-KW length: 256 using short derivedKey, normal salt, SHA-512, with normal info",0,null,null],["Derived key of type name: AES-KW length: 256 using short derivedKey, normal salt, SHA-512, with normal info with bad hash name SHA512",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-KW length: 256 using short derivedKey, normal salt, SHA-512, with normal info with missing deriveKey usage",0,null,null],["Derived key of type name: AES-KW length: 256 using short derivedKey, normal salt, SHA-512, with normal info with wrong (ECDH) key",0,null,null],["Derived key of type name: HMAC hash: SHA-1 length: 256 using short derivedKey, normal salt, SHA-512, with normal info",0,null,null],["Derived key of type name: HMAC hash: SHA-1 length: 256 using short derivedKey, normal salt, SHA-512, with normal info with bad hash name SHA512",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: HMAC hash: SHA-1 length: 256 using short derivedKey, normal salt, SHA-512, with normal info with missing deriveKey usage",0,null,null],["Derived key of type name: HMAC hash: SHA-1 length: 256 using short derivedKey, normal salt, SHA-512, with normal info with wrong (ECDH) key",0,null,null],["Derived key of type name: HMAC hash: SHA-256 length: 256 using short derivedKey, normal salt, SHA-512, with normal info",0,null,null],["Derived key of type name: HMAC hash: SHA-256 length: 256 using short derivedKey, normal salt, SHA-512, with normal info with bad hash name SHA512",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: HMAC hash: SHA-256 length: 256 using short derivedKey, normal salt, SHA-512, with normal info with missing deriveKey usage",0,null,null],["Derived key of type name: HMAC hash: SHA-256 length: 256 using short derivedKey, normal salt, SHA-512, with normal info with wrong (ECDH) key",0,null,null],["Derived key of type name: HMAC hash: SHA-384 length: 256 using short derivedKey, normal salt, SHA-512, with normal info",0,null,null],["Derived key of type name: HMAC hash: SHA-384 length: 256 using short derivedKey, normal salt, SHA-512, with normal info with bad hash name SHA512",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: HMAC hash: SHA-384 length: 256 using short derivedKey, normal salt, SHA-512, with normal info with missing deriveKey usage",0,null,null],["Derived key of type name: HMAC hash: SHA-384 length: 256 using short derivedKey, normal salt, SHA-512, with normal info with wrong (ECDH) key",0,null,null],["Derived key of type name: HMAC hash: SHA-512 length: 256 using short derivedKey, normal salt, SHA-512, with normal info",0,null,null],["Derived key of type name: HMAC hash: SHA-512 length: 256 using short derivedKey, normal salt, SHA-512, with normal info with bad hash name SHA512",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: HMAC hash: SHA-512 length: 256 using short derivedKey, normal salt, SHA-512, with normal info with missing deriveKey usage",0,null,null],["Derived key of type name: HMAC hash: SHA-512 length: 256 using short derivedKey, normal salt, SHA-512, with normal info with wrong (ECDH) key",0,null,null],["short derivedKey, normal salt, SHA-512, with normal info with missing salt",1,"assert_equals: deriveBits missing salt correctly threw OperationError: An invalid or illegal string was specified expected \"TypeError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:128:33\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:124:36\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:123:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["short derivedKey, normal salt, SHA-512, with normal info with missing info",1,"assert_equals: deriveBits missing info correctly threw OperationError: An invalid or illegal string was specified expected \"TypeError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:138:33\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:134:36\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:133:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["short derivedKey, normal salt, SHA-512, with normal info with null length",1,"assert_equals: deriveBits with null length correctly threw OperationError: Data provided to an operation does not meet requirements expected \"TypeError\" but got \"DataError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:148:33\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:144:36\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:143:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["short derivedKey, normal salt, SHA-512, with normal info with non-multiple of 8 length",1,"assert_unreached: non-multiple of 8 length should have thrown an OperationError Reached unreachable code","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:156:33\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:154:36\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:153:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["short derivedKey, normal salt, SHA-512, with normal info with bad hash name SHA512",1,"assert_equals: deriveBits with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:170:33\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:166:36\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:164:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["short derivedKey, normal salt, SHA-512, with normal info with missing deriveBits usage",0,null,null],["short derivedKey, normal salt, SHA-512, with normal info with wrong (ECDH) key",0,null,null],["short derivedKey, normal salt, SHA-512, with empty info",0,null,null],["short derivedKey, normal salt, SHA-512, with empty info with 0 length",1,"assert_equals: deriveBits with 0 length correctly threw OperationError: Data provided to an operation does not meet requirements expected \"OperationError\" but got \"DataError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:54:33\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:50:36\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:49:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-CBC length: 128 using short derivedKey, normal salt, SHA-512, with empty info",0,null,null],["Derived key of type name: AES-CBC length: 128 using short derivedKey, normal salt, SHA-512, with empty info with bad hash name SHA512",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-CBC length: 128 using short derivedKey, normal salt, SHA-512, with empty info with missing deriveKey usage",0,null,null],["Derived key of type name: AES-CBC length: 128 using short derivedKey, normal salt, SHA-512, with empty info with wrong (ECDH) key",0,null,null],["Derived key of type name: AES-CBC length: 192 using short derivedKey, normal salt, SHA-512, with empty info",0,null,null],["Derived key of type name: AES-CBC length: 192 using short derivedKey, normal salt, SHA-512, with empty info with bad hash name SHA512",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-CBC length: 192 using short derivedKey, normal salt, SHA-512, with empty info with missing deriveKey usage",0,null,null],["Derived key of type name: AES-CBC length: 192 using short derivedKey, normal salt, SHA-512, with empty info with wrong (ECDH) key",0,null,null],["Derived key of type name: AES-CBC length: 256 using short derivedKey, normal salt, SHA-512, with empty info",0,null,null],["Derived key of type name: AES-CBC length: 256 using short derivedKey, normal salt, SHA-512, with empty info with bad hash name SHA512",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-CBC length: 256 using short derivedKey, normal salt, SHA-512, with empty info with missing deriveKey usage",0,null,null],["Derived key of type name: AES-CBC length: 256 using short derivedKey, normal salt, SHA-512, with empty info with wrong (ECDH) key",0,null,null],["Derived key of type name: AES-CTR length: 128 using short derivedKey, normal salt, SHA-512, with empty info",0,null,null],["Derived key of type name: AES-CTR length: 128 using short derivedKey, normal salt, SHA-512, with empty info with bad hash name SHA512",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-CTR length: 128 using short derivedKey, normal salt, SHA-512, with empty info with missing deriveKey usage",0,null,null],["Derived key of type name: AES-CTR length: 128 using short derivedKey, normal salt, SHA-512, with empty info with wrong (ECDH) key",0,null,null],["Derived key of type name: AES-CTR length: 192 using short derivedKey, normal salt, SHA-512, with empty info",0,null,null],["Derived key of type name: AES-CTR length: 192 using short derivedKey, normal salt, SHA-512, with empty info with bad hash name SHA512",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-CTR length: 192 using short derivedKey, normal salt, SHA-512, with empty info with missing deriveKey usage",0,null,null],["Derived key of type name: AES-CTR length: 192 using short derivedKey, normal salt, SHA-512, with empty info with wrong (ECDH) key",0,null,null],["Derived key of type name: AES-CTR length: 256 using short derivedKey, normal salt, SHA-512, with empty info",0,null,null],["Derived key of type name: AES-CTR length: 256 using short derivedKey, normal salt, SHA-512, with empty info with bad hash name SHA512",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-CTR length: 256 using short derivedKey, normal salt, SHA-512, with empty info with missing deriveKey usage",0,null,null],["Derived key of type name: AES-CTR length: 256 using short derivedKey, normal salt, SHA-512, with empty info with wrong (ECDH) key",0,null,null],["Derived key of type name: AES-GCM length: 128 using short derivedKey, normal salt, SHA-512, with empty info",0,null,null],["Derived key of type name: AES-GCM length: 128 using short derivedKey, normal salt, SHA-512, with empty info with bad hash name SHA512",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-GCM length: 128 using short derivedKey, normal salt, SHA-512, with empty info with missing deriveKey usage",0,null,null],["Derived key of type name: AES-GCM length: 128 using short derivedKey, normal salt, SHA-512, with empty info with wrong (ECDH) key",0,null,null],["Derived key of type name: AES-GCM length: 192 using short derivedKey, normal salt, SHA-512, with empty info",0,null,null],["Derived key of type name: AES-GCM length: 192 using short derivedKey, normal salt, SHA-512, with empty info with bad hash name SHA512",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-GCM length: 192 using short derivedKey, normal salt, SHA-512, with empty info with missing deriveKey usage",0,null,null],["Derived key of type name: AES-GCM length: 192 using short derivedKey, normal salt, SHA-512, with empty info with wrong (ECDH) key",0,null,null],["Derived key of type name: AES-GCM length: 256 using short derivedKey, normal salt, SHA-512, with empty info",0,null,null],["Derived key of type name: AES-GCM length: 256 using short derivedKey, normal salt, SHA-512, with empty info with bad hash name SHA512",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-GCM length: 256 using short derivedKey, normal salt, SHA-512, with empty info with missing deriveKey usage",0,null,null],["Derived key of type name: AES-GCM length: 256 using short derivedKey, normal salt, SHA-512, with empty info with wrong (ECDH) key",0,null,null],["Derived key of type name: AES-KW length: 128 using short derivedKey, normal salt, SHA-512, with empty info",0,null,null],["Derived key of type name: AES-KW length: 128 using short derivedKey, normal salt, SHA-512, with empty info with bad hash name SHA512",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-KW length: 128 using short derivedKey, normal salt, SHA-512, with empty info with missing deriveKey usage",0,null,null],["Derived key of type name: AES-KW length: 128 using short derivedKey, normal salt, SHA-512, with empty info with wrong (ECDH) key",0,null,null],["Derived key of type name: AES-KW length: 192 using short derivedKey, normal salt, SHA-512, with empty info",0,null,null],["Derived key of type name: AES-KW length: 192 using short derivedKey, normal salt, SHA-512, with empty info with bad hash name SHA512",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-KW length: 192 using short derivedKey, normal salt, SHA-512, with empty info with missing deriveKey usage",0,null,null],["Derived key of type name: AES-KW length: 192 using short derivedKey, normal salt, SHA-512, with empty info with wrong (ECDH) key",0,null,null],["Derived key of type name: AES-KW length: 256 using short derivedKey, normal salt, SHA-512, with empty info",0,null,null],["Derived key of type name: AES-KW length: 256 using short derivedKey, normal salt, SHA-512, with empty info with bad hash name SHA512",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-KW length: 256 using short derivedKey, normal salt, SHA-512, with empty info with missing deriveKey usage",0,null,null],["Derived key of type name: AES-KW length: 256 using short derivedKey, normal salt, SHA-512, with empty info with wrong (ECDH) key",0,null,null],["Derived key of type name: HMAC hash: SHA-1 length: 256 using short derivedKey, normal salt, SHA-512, with empty info",0,null,null],["Derived key of type name: HMAC hash: SHA-1 length: 256 using short derivedKey, normal salt, SHA-512, with empty info with bad hash name SHA512",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: HMAC hash: SHA-1 length: 256 using short derivedKey, normal salt, SHA-512, with empty info with missing deriveKey usage",0,null,null],["Derived key of type name: HMAC hash: SHA-1 length: 256 using short derivedKey, normal salt, SHA-512, with empty info with wrong (ECDH) key",0,null,null],["Derived key of type name: HMAC hash: SHA-256 length: 256 using short derivedKey, normal salt, SHA-512, with empty info",0,null,null],["Derived key of type name: HMAC hash: SHA-256 length: 256 using short derivedKey, normal salt, SHA-512, with empty info with bad hash name SHA512",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: HMAC hash: SHA-256 length: 256 using short derivedKey, normal salt, SHA-512, with empty info with missing deriveKey usage",0,null,null],["Derived key of type name: HMAC hash: SHA-256 length: 256 using short derivedKey, normal salt, SHA-512, with empty info with wrong (ECDH) key",0,null,null],["Derived key of type name: HMAC hash: SHA-384 length: 256 using short derivedKey, normal salt, SHA-512, with empty info",0,null,null],["Derived key of type name: HMAC hash: SHA-384 length: 256 using short derivedKey, normal salt, SHA-512, with empty info with bad hash name SHA512",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: HMAC hash: SHA-384 length: 256 using short derivedKey, normal salt, SHA-512, with empty info with missing deriveKey usage",0,null,null],["Derived key of type name: HMAC hash: SHA-384 length: 256 using short derivedKey, normal salt, SHA-512, with empty info with wrong (ECDH) key",0,null,null],["Derived key of type name: HMAC hash: SHA-512 length: 256 using short derivedKey, normal salt, SHA-512, with empty info",0,null,null],["Derived key of type name: HMAC hash: SHA-512 length: 256 using short derivedKey, normal salt, SHA-512, with empty info with bad hash name SHA512",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: HMAC hash: SHA-512 length: 256 using short derivedKey, normal salt, SHA-512, with empty info with missing deriveKey usage",0,null,null],["Derived key of type name: HMAC hash: SHA-512 length: 256 using short derivedKey, normal salt, SHA-512, with empty info with wrong (ECDH) key",0,null,null],["short derivedKey, normal salt, SHA-512, with empty info with missing salt",1,"assert_equals: deriveBits missing salt correctly threw OperationError: An invalid or illegal string was specified expected \"TypeError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:128:33\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:124:36\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:123:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["short derivedKey, normal salt, SHA-512, with empty info with missing info",1,"assert_equals: deriveBits missing info correctly threw OperationError: An invalid or illegal string was specified expected \"TypeError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:138:33\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:134:36\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:133:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["short derivedKey, normal salt, SHA-512, with empty info with null length",1,"assert_equals: deriveBits with null length correctly threw OperationError: Data provided to an operation does not meet requirements expected \"TypeError\" but got \"DataError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:148:33\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:144:36\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:143:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["short derivedKey, normal salt, SHA-512, with empty info with non-multiple of 8 length",1,"assert_unreached: non-multiple of 8 length should have thrown an OperationError Reached unreachable code","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:156:33\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:154:36\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:153:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["short derivedKey, normal salt, SHA-512, with empty info with bad hash name SHA512",1,"assert_equals: deriveBits with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:170:33\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:166:36\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:164:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["short derivedKey, normal salt, SHA-512, with empty info with missing deriveBits usage",0,null,null],["short derivedKey, normal salt, SHA-512, with empty info with wrong (ECDH) key",0,null,null],["short derivedKey, normal salt, SHA-1, with normal info",0,null,null],["short derivedKey, normal salt, SHA-1, with normal info with 0 length",1,"assert_equals: deriveBits with 0 length correctly threw OperationError: Data provided to an operation does not meet requirements expected \"OperationError\" but got \"DataError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:54:33\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:50:36\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:49:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-CBC length: 128 using short derivedKey, normal salt, SHA-1, with normal info",0,null,null],["Derived key of type name: AES-CBC length: 128 using short derivedKey, normal salt, SHA-1, with normal info with bad hash name SHA1",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-CBC length: 128 using short derivedKey, normal salt, SHA-1, with normal info with missing deriveKey usage",0,null,null],["Derived key of type name: AES-CBC length: 128 using short derivedKey, normal salt, SHA-1, with normal info with wrong (ECDH) key",0,null,null],["Derived key of type name: AES-CBC length: 192 using short derivedKey, normal salt, SHA-1, with normal info",0,null,null],["Derived key of type name: AES-CBC length: 192 using short derivedKey, normal salt, SHA-1, with normal info with bad hash name SHA1",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-CBC length: 192 using short derivedKey, normal salt, SHA-1, with normal info with missing deriveKey usage",0,null,null],["Derived key of type name: AES-CBC length: 192 using short derivedKey, normal salt, SHA-1, with normal info with wrong (ECDH) key",0,null,null],["Derived key of type name: AES-CBC length: 256 using short derivedKey, normal salt, SHA-1, with normal info",0,null,null],["Derived key of type name: AES-CBC length: 256 using short derivedKey, normal salt, SHA-1, with normal info with bad hash name SHA1",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-CBC length: 256 using short derivedKey, normal salt, SHA-1, with normal info with missing deriveKey usage",0,null,null],["Derived key of type name: AES-CBC length: 256 using short derivedKey, normal salt, SHA-1, with normal info with wrong (ECDH) key",0,null,null],["Derived key of type name: AES-CTR length: 128 using short derivedKey, normal salt, SHA-1, with normal info",0,null,null],["Derived key of type name: AES-CTR length: 128 using short derivedKey, normal salt, SHA-1, with normal info with bad hash name SHA1",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-CTR length: 128 using short derivedKey, normal salt, SHA-1, with normal info with missing deriveKey usage",0,null,null],["Derived key of type name: AES-CTR length: 128 using short derivedKey, normal salt, SHA-1, with normal info with wrong (ECDH) key",0,null,null],["Derived key of type name: AES-CTR length: 192 using short derivedKey, normal salt, SHA-1, with normal info",0,null,null],["Derived key of type name: AES-CTR length: 192 using short derivedKey, normal salt, SHA-1, with normal info with bad hash name SHA1",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-CTR length: 192 using short derivedKey, normal salt, SHA-1, with normal info with missing deriveKey usage",0,null,null],["Derived key of type name: AES-CTR length: 192 using short derivedKey, normal salt, SHA-1, with normal info with wrong (ECDH) key",0,null,null],["Derived key of type name: AES-CTR length: 256 using short derivedKey, normal salt, SHA-1, with normal info",0,null,null],["Derived key of type name: AES-CTR length: 256 using short derivedKey, normal salt, SHA-1, with normal info with bad hash name SHA1",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-CTR length: 256 using short derivedKey, normal salt, SHA-1, with normal info with missing deriveKey usage",0,null,null],["Derived key of type name: AES-CTR length: 256 using short derivedKey, normal salt, SHA-1, with normal info with wrong (ECDH) key",0,null,null],["Derived key of type name: AES-GCM length: 128 using short derivedKey, normal salt, SHA-1, with normal info",0,null,null],["Derived key of type name: AES-GCM length: 128 using short derivedKey, normal salt, SHA-1, with normal info with bad hash name SHA1",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-GCM length: 128 using short derivedKey, normal salt, SHA-1, with normal info with missing deriveKey usage",0,null,null],["Derived key of type name: AES-GCM length: 128 using short derivedKey, normal salt, SHA-1, with normal info with wrong (ECDH) key",0,null,null],["Derived key of type name: AES-GCM length: 192 using short derivedKey, normal salt, SHA-1, with normal info",0,null,null],["Derived key of type name: AES-GCM length: 192 using short derivedKey, normal salt, SHA-1, with normal info with bad hash name SHA1",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-GCM length: 192 using short derivedKey, normal salt, SHA-1, with normal info with missing deriveKey usage",0,null,null],["Derived key of type name: AES-GCM length: 192 using short derivedKey, normal salt, SHA-1, with normal info with wrong (ECDH) key",0,null,null],["Derived key of type name: AES-GCM length: 256 using short derivedKey, normal salt, SHA-1, with normal info",0,null,null],["Derived key of type name: AES-GCM length: 256 using short derivedKey, normal salt, SHA-1, with normal info with bad hash name SHA1",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-GCM length: 256 using short derivedKey, normal salt, SHA-1, with normal info with missing deriveKey usage",0,null,null],["Derived key of type name: AES-GCM length: 256 using short derivedKey, normal salt, SHA-1, with normal info with wrong (ECDH) key",0,null,null],["Derived key of type name: AES-KW length: 128 using short derivedKey, normal salt, SHA-1, with normal info",0,null,null],["Derived key of type name: AES-KW length: 128 using short derivedKey, normal salt, SHA-1, with normal info with bad hash name SHA1",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-KW length: 128 using short derivedKey, normal salt, SHA-1, with normal info with missing deriveKey usage",0,null,null],["Derived key of type name: AES-KW length: 128 using short derivedKey, normal salt, SHA-1, with normal info with wrong (ECDH) key",0,null,null],["Derived key of type name: AES-KW length: 192 using short derivedKey, normal salt, SHA-1, with normal info",0,null,null],["Derived key of type name: AES-KW length: 192 using short derivedKey, normal salt, SHA-1, with normal info with bad hash name SHA1",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-KW length: 192 using short derivedKey, normal salt, SHA-1, with normal info with missing deriveKey usage",0,null,null],["Derived key of type name: AES-KW length: 192 using short derivedKey, normal salt, SHA-1, with normal info with wrong (ECDH) key",0,null,null],["Derived key of type name: AES-KW length: 256 using short derivedKey, normal salt, SHA-1, with normal info",0,null,null],["Derived key of type name: AES-KW length: 256 using short derivedKey, normal salt, SHA-1, with normal info with bad hash name SHA1",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-KW length: 256 using short derivedKey, normal salt, SHA-1, with normal info with missing deriveKey usage",0,null,null],["Derived key of type name: AES-KW length: 256 using short derivedKey, normal salt, SHA-1, with normal info with wrong (ECDH) key",0,null,null],["Derived key of type name: HMAC hash: SHA-1 length: 256 using short derivedKey, normal salt, SHA-1, with normal info",0,null,null],["Derived key of type name: HMAC hash: SHA-1 length: 256 using short derivedKey, normal salt, SHA-1, with normal info with bad hash name SHA1",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: HMAC hash: SHA-1 length: 256 using short derivedKey, normal salt, SHA-1, with normal info with missing deriveKey usage",0,null,null],["Derived key of type name: HMAC hash: SHA-1 length: 256 using short derivedKey, normal salt, SHA-1, with normal info with wrong (ECDH) key",0,null,null],["Derived key of type name: HMAC hash: SHA-256 length: 256 using short derivedKey, normal salt, SHA-1, with normal info",0,null,null],["Derived key of type name: HMAC hash: SHA-256 length: 256 using short derivedKey, normal salt, SHA-1, with normal info with bad hash name SHA1",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: HMAC hash: SHA-256 length: 256 using short derivedKey, normal salt, SHA-1, with normal info with missing deriveKey usage",0,null,null],["Derived key of type name: HMAC hash: SHA-256 length: 256 using short derivedKey, normal salt, SHA-1, with normal info with wrong (ECDH) key",0,null,null],["Derived key of type name: HMAC hash: SHA-384 length: 256 using short derivedKey, normal salt, SHA-1, with normal info",0,null,null],["Derived key of type name: HMAC hash: SHA-384 length: 256 using short derivedKey, normal salt, SHA-1, with normal info with bad hash name SHA1",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: HMAC hash: SHA-384 length: 256 using short derivedKey, normal salt, SHA-1, with normal info with missing deriveKey usage",0,null,null],["Derived key of type name: HMAC hash: SHA-384 length: 256 using short derivedKey, normal salt, SHA-1, with normal info with wrong (ECDH) key",0,null,null],["Derived key of type name: HMAC hash: SHA-512 length: 256 using short derivedKey, normal salt, SHA-1, with normal info",0,null,null],["Derived key of type name: HMAC hash: SHA-512 length: 256 using short derivedKey, normal salt, SHA-1, with normal info with bad hash name SHA1",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: HMAC hash: SHA-512 length: 256 using short derivedKey, normal salt, SHA-1, with normal info with missing deriveKey usage",0,null,null],["Derived key of type name: HMAC hash: SHA-512 length: 256 using short derivedKey, normal salt, SHA-1, with normal info with wrong (ECDH) key",0,null,null],["short derivedKey, normal salt, SHA-1, with normal info with missing salt",1,"assert_equals: deriveBits missing salt correctly threw OperationError: An invalid or illegal string was specified expected \"TypeError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:128:33\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:124:36\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:123:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["short derivedKey, normal salt, SHA-1, with normal info with missing info",1,"assert_equals: deriveBits missing info correctly threw OperationError: An invalid or illegal string was specified expected \"TypeError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:138:33\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:134:36\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:133:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["short derivedKey, normal salt, SHA-1, with normal info with null length",1,"assert_equals: deriveBits with null length correctly threw OperationError: Data provided to an operation does not meet requirements expected \"TypeError\" but got \"DataError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:148:33\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:144:36\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:143:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["short derivedKey, normal salt, SHA-1, with normal info with non-multiple of 8 length",1,"assert_unreached: non-multiple of 8 length should have thrown an OperationError Reached unreachable code","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:156:33\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:154:36\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:153:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["short derivedKey, normal salt, SHA-1, with normal info with bad hash name SHA1",1,"assert_equals: deriveBits with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:170:33\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:166:36\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:164:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["short derivedKey, normal salt, SHA-1, with normal info with missing deriveBits usage",0,null,null],["short derivedKey, normal salt, SHA-1, with normal info with wrong (ECDH) key",0,null,null],["short derivedKey, normal salt, SHA-1, with empty info",0,null,null],["short derivedKey, normal salt, SHA-1, with empty info with 0 length",1,"assert_equals: deriveBits with 0 length correctly threw OperationError: Data provided to an operation does not meet requirements expected \"OperationError\" but got \"DataError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:54:33\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:50:36\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:49:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-CBC length: 128 using short derivedKey, normal salt, SHA-1, with empty info",0,null,null],["Derived key of type name: AES-CBC length: 128 using short derivedKey, normal salt, SHA-1, with empty info with bad hash name SHA1",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-CBC length: 128 using short derivedKey, normal salt, SHA-1, with empty info with missing deriveKey usage",0,null,null],["Derived key of type name: AES-CBC length: 128 using short derivedKey, normal salt, SHA-1, with empty info with wrong (ECDH) key",0,null,null],["Derived key of type name: AES-CBC length: 192 using short derivedKey, normal salt, SHA-1, with empty info",0,null,null],["Derived key of type name: AES-CBC length: 192 using short derivedKey, normal salt, SHA-1, with empty info with bad hash name SHA1",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-CBC length: 192 using short derivedKey, normal salt, SHA-1, with empty info with missing deriveKey usage",0,null,null],["Derived key of type name: AES-CBC length: 192 using short derivedKey, normal salt, SHA-1, with empty info with wrong (ECDH) key",0,null,null],["Derived key of type name: AES-CBC length: 256 using short derivedKey, normal salt, SHA-1, with empty info",0,null,null],["Derived key of type name: AES-CBC length: 256 using short derivedKey, normal salt, SHA-1, with empty info with bad hash name SHA1",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-CBC length: 256 using short derivedKey, normal salt, SHA-1, with empty info with missing deriveKey usage",0,null,null],["Derived key of type name: AES-CBC length: 256 using short derivedKey, normal salt, SHA-1, with empty info with wrong (ECDH) key",0,null,null],["Derived key of type name: AES-CTR length: 128 using short derivedKey, normal salt, SHA-1, with empty info",0,null,null],["Derived key of type name: AES-CTR length: 128 using short derivedKey, normal salt, SHA-1, with empty info with bad hash name SHA1",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-CTR length: 128 using short derivedKey, normal salt, SHA-1, with empty info with missing deriveKey usage",0,null,null],["Derived key of type name: AES-CTR length: 128 using short derivedKey, normal salt, SHA-1, with empty info with wrong (ECDH) key",0,null,null],["Derived key of type name: AES-CTR length: 192 using short derivedKey, normal salt, SHA-1, with empty info",0,null,null],["Derived key of type name: AES-CTR length: 192 using short derivedKey, normal salt, SHA-1, with empty info with bad hash name SHA1",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-CTR length: 192 using short derivedKey, normal salt, SHA-1, with empty info with missing deriveKey usage",0,null,null],["Derived key of type name: AES-CTR length: 192 using short derivedKey, normal salt, SHA-1, with empty info with wrong (ECDH) key",0,null,null],["Derived key of type name: AES-CTR length: 256 using short derivedKey, normal salt, SHA-1, with empty info",0,null,null],["Derived key of type name: AES-CTR length: 256 using short derivedKey, normal salt, SHA-1, with empty info with bad hash name SHA1",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-CTR length: 256 using short derivedKey, normal salt, SHA-1, with empty info with missing deriveKey usage",0,null,null],["Derived key of type name: AES-CTR length: 256 using short derivedKey, normal salt, SHA-1, with empty info with wrong (ECDH) key",0,null,null],["Derived key of type name: AES-GCM length: 128 using short derivedKey, normal salt, SHA-1, with empty info",0,null,null],["Derived key of type name: AES-GCM length: 128 using short derivedKey, normal salt, SHA-1, with empty info with bad hash name SHA1",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-GCM length: 128 using short derivedKey, normal salt, SHA-1, with empty info with missing deriveKey usage",0,null,null],["Derived key of type name: AES-GCM length: 128 using short derivedKey, normal salt, SHA-1, with empty info with wrong (ECDH) key",0,null,null],["Derived key of type name: AES-GCM length: 192 using short derivedKey, normal salt, SHA-1, with empty info",0,null,null],["Derived key of type name: AES-GCM length: 192 using short derivedKey, normal salt, SHA-1, with empty info with bad hash name SHA1",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-GCM length: 192 using short derivedKey, normal salt, SHA-1, with empty info with missing deriveKey usage",0,null,null],["Derived key of type name: AES-GCM length: 192 using short derivedKey, normal salt, SHA-1, with empty info with wrong (ECDH) key",0,null,null],["Derived key of type name: AES-GCM length: 256 using short derivedKey, normal salt, SHA-1, with empty info",0,null,null],["Derived key of type name: AES-GCM length: 256 using short derivedKey, normal salt, SHA-1, with empty info with bad hash name SHA1",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-GCM length: 256 using short derivedKey, normal salt, SHA-1, with empty info with missing deriveKey usage",0,null,null],["Derived key of type name: AES-GCM length: 256 using short derivedKey, normal salt, SHA-1, with empty info with wrong (ECDH) key",0,null,null],["Derived key of type name: AES-KW length: 128 using short derivedKey, normal salt, SHA-1, with empty info",0,null,null],["Derived key of type name: AES-KW length: 128 using short derivedKey, normal salt, SHA-1, with empty info with bad hash name SHA1",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-KW length: 128 using short derivedKey, normal salt, SHA-1, with empty info with missing deriveKey usage",0,null,null],["Derived key of type name: AES-KW length: 128 using short derivedKey, normal salt, SHA-1, with empty info with wrong (ECDH) key",0,null,null],["Derived key of type name: AES-KW length: 192 using short derivedKey, normal salt, SHA-1, with empty info",0,null,null],["Derived key of type name: AES-KW length: 192 using short derivedKey, normal salt, SHA-1, with empty info with bad hash name SHA1",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-KW length: 192 using short derivedKey, normal salt, SHA-1, with empty info with missing deriveKey usage",0,null,null],["Derived key of type name: AES-KW length: 192 using short derivedKey, normal salt, SHA-1, with empty info with wrong (ECDH) key",0,null,null],["Derived key of type name: AES-KW length: 256 using short derivedKey, normal salt, SHA-1, with empty info",0,null,null],["Derived key of type name: AES-KW length: 256 using short derivedKey, normal salt, SHA-1, with empty info with bad hash name SHA1",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-KW length: 256 using short derivedKey, normal salt, SHA-1, with empty info with missing deriveKey usage",0,null,null],["Derived key of type name: AES-KW length: 256 using short derivedKey, normal salt, SHA-1, with empty info with wrong (ECDH) key",0,null,null],["Derived key of type name: HMAC hash: SHA-1 length: 256 using short derivedKey, normal salt, SHA-1, with empty info",0,null,null],["Derived key of type name: HMAC hash: SHA-1 length: 256 using short derivedKey, normal salt, SHA-1, with empty info with bad hash name SHA1",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: HMAC hash: SHA-1 length: 256 using short derivedKey, normal salt, SHA-1, with empty info with missing deriveKey usage",0,null,null],["Derived key of type name: HMAC hash: SHA-1 length: 256 using short derivedKey, normal salt, SHA-1, with empty info with wrong (ECDH) key",0,null,null],["Derived key of type name: HMAC hash: SHA-256 length: 256 using short derivedKey, normal salt, SHA-1, with empty info",0,null,null],["Derived key of type name: HMAC hash: SHA-256 length: 256 using short derivedKey, normal salt, SHA-1, with empty info with bad hash name SHA1",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: HMAC hash: SHA-256 length: 256 using short derivedKey, normal salt, SHA-1, with empty info with missing deriveKey usage",0,null,null],["Derived key of type name: HMAC hash: SHA-256 length: 256 using short derivedKey, normal salt, SHA-1, with empty info with wrong (ECDH) key",0,null,null],["Derived key of type name: HMAC hash: SHA-384 length: 256 using short derivedKey, normal salt, SHA-1, with empty info",0,null,null],["Derived key of type name: HMAC hash: SHA-384 length: 256 using short derivedKey, normal salt, SHA-1, with empty info with bad hash name SHA1",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: HMAC hash: SHA-384 length: 256 using short derivedKey, normal salt, SHA-1, with empty info with missing deriveKey usage",0,null,null],["Derived key of type name: HMAC hash: SHA-384 length: 256 using short derivedKey, normal salt, SHA-1, with empty info with wrong (ECDH) key",0,null,null],["Derived key of type name: HMAC hash: SHA-512 length: 256 using short derivedKey, normal salt, SHA-1, with empty info",0,null,null],["Derived key of type name: HMAC hash: SHA-512 length: 256 using short derivedKey, normal salt, SHA-1, with empty info with bad hash name SHA1",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: HMAC hash: SHA-512 length: 256 using short derivedKey, normal salt, SHA-1, with empty info with missing deriveKey usage",0,null,null],["Derived key of type name: HMAC hash: SHA-512 length: 256 using short derivedKey, normal salt, SHA-1, with empty info with wrong (ECDH) key",0,null,null],["short derivedKey, normal salt, SHA-1, with empty info with missing salt",1,"assert_equals: deriveBits missing salt correctly threw OperationError: An invalid or illegal string was specified expected \"TypeError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:128:33\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:124:36\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:123:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["short derivedKey, normal salt, SHA-1, with empty info with missing info",1,"assert_equals: deriveBits missing info correctly threw OperationError: An invalid or illegal string was specified expected \"TypeError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:138:33\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:134:36\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:133:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["short derivedKey, normal salt, SHA-1, with empty info with null length",1,"assert_equals: deriveBits with null length correctly threw OperationError: Data provided to an operation does not meet requirements expected \"TypeError\" but got \"DataError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:148:33\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:144:36\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:143:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["short derivedKey, normal salt, SHA-1, with empty info with non-multiple of 8 length",1,"assert_unreached: non-multiple of 8 length should have thrown an OperationError Reached unreachable code","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:156:33\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:154:36\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:153:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["short derivedKey, normal salt, SHA-1, with empty info with bad hash name SHA1",1,"assert_equals: deriveBits with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:170:33\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:166:36\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:164:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["short derivedKey, normal salt, SHA-1, with empty info with missing deriveBits usage",0,null,null],["short derivedKey, normal salt, SHA-1, with empty info with wrong (ECDH) key",0,null,null],["short derivedKey, normal salt, SHA-256, with normal info",0,null,null],["short derivedKey, normal salt, SHA-256, with normal info with 0 length",1,"assert_equals: deriveBits with 0 length correctly threw OperationError: Data provided to an operation does not meet requirements expected \"OperationError\" but got \"DataError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:54:33\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:50:36\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:49:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-CBC length: 128 using short derivedKey, normal salt, SHA-256, with normal info",0,null,null],["Derived key of type name: AES-CBC length: 128 using short derivedKey, normal salt, SHA-256, with normal info with bad hash name SHA256",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-CBC length: 128 using short derivedKey, normal salt, SHA-256, with normal info with missing deriveKey usage",0,null,null],["Derived key of type name: AES-CBC length: 128 using short derivedKey, normal salt, SHA-256, with normal info with wrong (ECDH) key",0,null,null],["Derived key of type name: AES-CBC length: 192 using short derivedKey, normal salt, SHA-256, with normal info",0,null,null],["Derived key of type name: AES-CBC length: 192 using short derivedKey, normal salt, SHA-256, with normal info with bad hash name SHA256",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-CBC length: 192 using short derivedKey, normal salt, SHA-256, with normal info with missing deriveKey usage",0,null,null],["Derived key of type name: AES-CBC length: 192 using short derivedKey, normal salt, SHA-256, with normal info with wrong (ECDH) key",0,null,null],["Derived key of type name: AES-CBC length: 256 using short derivedKey, normal salt, SHA-256, with normal info",0,null,null],["Derived key of type name: AES-CBC length: 256 using short derivedKey, normal salt, SHA-256, with normal info with bad hash name SHA256",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-CBC length: 256 using short derivedKey, normal salt, SHA-256, with normal info with missing deriveKey usage",0,null,null],["Derived key of type name: AES-CBC length: 256 using short derivedKey, normal salt, SHA-256, with normal info with wrong (ECDH) key",0,null,null],["Derived key of type name: AES-CTR length: 128 using short derivedKey, normal salt, SHA-256, with normal info",0,null,null],["Derived key of type name: AES-CTR length: 128 using short derivedKey, normal salt, SHA-256, with normal info with bad hash name SHA256",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-CTR length: 128 using short derivedKey, normal salt, SHA-256, with normal info with missing deriveKey usage",0,null,null],["Derived key of type name: AES-CTR length: 128 using short derivedKey, normal salt, SHA-256, with normal info with wrong (ECDH) key",0,null,null],["Derived key of type name: AES-CTR length: 192 using short derivedKey, normal salt, SHA-256, with normal info",0,null,null],["Derived key of type name: AES-CTR length: 192 using short derivedKey, normal salt, SHA-256, with normal info with bad hash name SHA256",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-CTR length: 192 using short derivedKey, normal salt, SHA-256, with normal info with missing deriveKey usage",0,null,null],["Derived key of type name: AES-CTR length: 192 using short derivedKey, normal salt, SHA-256, with normal info with wrong (ECDH) key",0,null,null],["Derived key of type name: AES-CTR length: 256 using short derivedKey, normal salt, SHA-256, with normal info",0,null,null],["Derived key of type name: AES-CTR length: 256 using short derivedKey, normal salt, SHA-256, with normal info with bad hash name SHA256",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-CTR length: 256 using short derivedKey, normal salt, SHA-256, with normal info with missing deriveKey usage",0,null,null],["Derived key of type name: AES-CTR length: 256 using short derivedKey, normal salt, SHA-256, with normal info with wrong (ECDH) key",0,null,null],["Derived key of type name: AES-GCM length: 128 using short derivedKey, normal salt, SHA-256, with normal info",0,null,null],["Derived key of type name: AES-GCM length: 128 using short derivedKey, normal salt, SHA-256, with normal info with bad hash name SHA256",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-GCM length: 128 using short derivedKey, normal salt, SHA-256, with normal info with missing deriveKey usage",0,null,null],["Derived key of type name: AES-GCM length: 128 using short derivedKey, normal salt, SHA-256, with normal info with wrong (ECDH) key",0,null,null],["Derived key of type name: AES-GCM length: 192 using short derivedKey, normal salt, SHA-256, with normal info",0,null,null],["Derived key of type name: AES-GCM length: 192 using short derivedKey, normal salt, SHA-256, with normal info with bad hash name SHA256",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-GCM length: 192 using short derivedKey, normal salt, SHA-256, with normal info with missing deriveKey usage",0,null,null],["Derived key of type name: AES-GCM length: 192 using short derivedKey, normal salt, SHA-256, with normal info with wrong (ECDH) key",0,null,null],["Derived key of type name: AES-GCM length: 256 using short derivedKey, normal salt, SHA-256, with normal info",0,null,null],["Derived key of type name: AES-GCM length: 256 using short derivedKey, normal salt, SHA-256, with normal info with bad hash name SHA256",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-GCM length: 256 using short derivedKey, normal salt, SHA-256, with normal info with missing deriveKey usage",0,null,null],["Derived key of type name: AES-GCM length: 256 using short derivedKey, normal salt, SHA-256, with normal info with wrong (ECDH) key",0,null,null],["Derived key of type name: AES-KW length: 128 using short derivedKey, normal salt, SHA-256, with normal info",0,null,null],["Derived key of type name: AES-KW length: 128 using short derivedKey, normal salt, SHA-256, with normal info with bad hash name SHA256",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-KW length: 128 using short derivedKey, normal salt, SHA-256, with normal info with missing deriveKey usage",0,null,null],["Derived key of type name: AES-KW length: 128 using short derivedKey, normal salt, SHA-256, with normal info with wrong (ECDH) key",0,null,null],["Derived key of type name: AES-KW length: 192 using short derivedKey, normal salt, SHA-256, with normal info",0,null,null],["Derived key of type name: AES-KW length: 192 using short derivedKey, normal salt, SHA-256, with normal info with bad hash name SHA256",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-KW length: 192 using short derivedKey, normal salt, SHA-256, with normal info with missing deriveKey usage",0,null,null],["Derived key of type name: AES-KW length: 192 using short derivedKey, normal salt, SHA-256, with normal info with wrong (ECDH) key",0,null,null],["Derived key of type name: AES-KW length: 256 using short derivedKey, normal salt, SHA-256, with normal info",0,null,null],["Derived key of type name: AES-KW length: 256 using short derivedKey, normal salt, SHA-256, with normal info with bad hash name SHA256",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-KW length: 256 using short derivedKey, normal salt, SHA-256, with normal info with missing deriveKey usage",0,null,null],["Derived key of type name: AES-KW length: 256 using short derivedKey, normal salt, SHA-256, with normal info with wrong (ECDH) key",0,null,null],["Derived key of type name: HMAC hash: SHA-1 length: 256 using short derivedKey, normal salt, SHA-256, with normal info",0,null,null],["Derived key of type name: HMAC hash: SHA-1 length: 256 using short derivedKey, normal salt, SHA-256, with normal info with bad hash name SHA256",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: HMAC hash: SHA-1 length: 256 using short derivedKey, normal salt, SHA-256, with normal info with missing deriveKey usage",0,null,null],["Derived key of type name: HMAC hash: SHA-1 length: 256 using short derivedKey, normal salt, SHA-256, with normal info with wrong (ECDH) key",0,null,null],["Derived key of type name: HMAC hash: SHA-256 length: 256 using short derivedKey, normal salt, SHA-256, with normal info",0,null,null],["Derived key of type name: HMAC hash: SHA-256 length: 256 using short derivedKey, normal salt, SHA-256, with normal info with bad hash name SHA256",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: HMAC hash: SHA-256 length: 256 using short derivedKey, normal salt, SHA-256, with normal info with missing deriveKey usage",0,null,null],["Derived key of type name: HMAC hash: SHA-256 length: 256 using short derivedKey, normal salt, SHA-256, with normal info with wrong (ECDH) key",0,null,null],["Derived key of type name: HMAC hash: SHA-384 length: 256 using short derivedKey, normal salt, SHA-256, with normal info",0,null,null],["Derived key of type name: HMAC hash: SHA-384 length: 256 using short derivedKey, normal salt, SHA-256, with normal info with bad hash name SHA256",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: HMAC hash: SHA-384 length: 256 using short derivedKey, normal salt, SHA-256, with normal info with missing deriveKey usage",0,null,null],["Derived key of type name: HMAC hash: SHA-384 length: 256 using short derivedKey, normal salt, SHA-256, with normal info with wrong (ECDH) key",0,null,null],["Derived key of type name: HMAC hash: SHA-512 length: 256 using short derivedKey, normal salt, SHA-256, with normal info",0,null,null],["Derived key of type name: HMAC hash: SHA-512 length: 256 using short derivedKey, normal salt, SHA-256, with normal info with bad hash name SHA256",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: HMAC hash: SHA-512 length: 256 using short derivedKey, normal salt, SHA-256, with normal info with missing deriveKey usage",0,null,null],["Derived key of type name: HMAC hash: SHA-512 length: 256 using short derivedKey, normal salt, SHA-256, with normal info with wrong (ECDH) key",0,null,null],["short derivedKey, normal salt, SHA-256, with normal info with missing salt",1,"assert_equals: deriveBits missing salt correctly threw OperationError: An invalid or illegal string was specified expected \"TypeError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:128:33\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:124:36\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:123:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["short derivedKey, normal salt, SHA-256, with normal info with missing info",1,"assert_equals: deriveBits missing info correctly threw OperationError: An invalid or illegal string was specified expected \"TypeError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:138:33\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:134:36\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:133:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["short derivedKey, normal salt, SHA-256, with normal info with null length",1,"assert_equals: deriveBits with null length correctly threw OperationError: Data provided to an operation does not meet requirements expected \"TypeError\" but got \"DataError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:148:33\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:144:36\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:143:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["short derivedKey, normal salt, SHA-256, with normal info with non-multiple of 8 length",1,"assert_unreached: non-multiple of 8 length should have thrown an OperationError Reached unreachable code","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:156:33\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:154:36\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:153:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["short derivedKey, normal salt, SHA-256, with normal info with bad hash name SHA256",1,"assert_equals: deriveBits with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:170:33\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:166:36\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:164:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["short derivedKey, normal salt, SHA-256, with normal info with missing deriveBits usage",0,null,null],["short derivedKey, normal salt, SHA-256, with normal info with wrong (ECDH) key",0,null,null],["short derivedKey, normal salt, SHA-256, with empty info",0,null,null],["short derivedKey, normal salt, SHA-256, with empty info with 0 length",1,"assert_equals: deriveBits with 0 length correctly threw OperationError: Data provided to an operation does not meet requirements expected \"OperationError\" but got \"DataError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:54:33\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:50:36\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:49:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-CBC length: 128 using short derivedKey, normal salt, SHA-256, with empty info",0,null,null],["Derived key of type name: AES-CBC length: 128 using short derivedKey, normal salt, SHA-256, with empty info with bad hash name SHA256",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-CBC length: 128 using short derivedKey, normal salt, SHA-256, with empty info with missing deriveKey usage",0,null,null],["Derived key of type name: AES-CBC length: 128 using short derivedKey, normal salt, SHA-256, with empty info with wrong (ECDH) key",0,null,null],["Derived key of type name: AES-CBC length: 192 using short derivedKey, normal salt, SHA-256, with empty info",0,null,null],["Derived key of type name: AES-CBC length: 192 using short derivedKey, normal salt, SHA-256, with empty info with bad hash name SHA256",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-CBC length: 192 using short derivedKey, normal salt, SHA-256, with empty info with missing deriveKey usage",0,null,null],["Derived key of type name: AES-CBC length: 192 using short derivedKey, normal salt, SHA-256, with empty info with wrong (ECDH) key",0,null,null],["Derived key of type name: AES-CBC length: 256 using short derivedKey, normal salt, SHA-256, with empty info",0,null,null],["Derived key of type name: AES-CBC length: 256 using short derivedKey, normal salt, SHA-256, with empty info with bad hash name SHA256",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-CBC length: 256 using short derivedKey, normal salt, SHA-256, with empty info with missing deriveKey usage",0,null,null],["Derived key of type name: AES-CBC length: 256 using short derivedKey, normal salt, SHA-256, with empty info with wrong (ECDH) key",0,null,null],["Derived key of type name: AES-CTR length: 128 using short derivedKey, normal salt, SHA-256, with empty info",0,null,null],["Derived key of type name: AES-CTR length: 128 using short derivedKey, normal salt, SHA-256, with empty info with bad hash name SHA256",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-CTR length: 128 using short derivedKey, normal salt, SHA-256, with empty info with missing deriveKey usage",0,null,null],["Derived key of type name: AES-CTR length: 128 using short derivedKey, normal salt, SHA-256, with empty info with wrong (ECDH) key",0,null,null],["Derived key of type name: AES-CTR length: 192 using short derivedKey, normal salt, SHA-256, with empty info",0,null,null],["Derived key of type name: AES-CTR length: 192 using short derivedKey, normal salt, SHA-256, with empty info with bad hash name SHA256",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-CTR length: 192 using short derivedKey, normal salt, SHA-256, with empty info with missing deriveKey usage",0,null,null],["Derived key of type name: AES-CTR length: 192 using short derivedKey, normal salt, SHA-256, with empty info with wrong (ECDH) key",0,null,null],["Derived key of type name: AES-CTR length: 256 using short derivedKey, normal salt, SHA-256, with empty info",0,null,null],["Derived key of type name: AES-CTR length: 256 using short derivedKey, normal salt, SHA-256, with empty info with bad hash name SHA256",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-CTR length: 256 using short derivedKey, normal salt, SHA-256, with empty info with missing deriveKey usage",0,null,null],["Derived key of type name: AES-CTR length: 256 using short derivedKey, normal salt, SHA-256, with empty info with wrong (ECDH) key",0,null,null],["Derived key of type name: AES-GCM length: 128 using short derivedKey, normal salt, SHA-256, with empty info",0,null,null],["Derived key of type name: AES-GCM length: 128 using short derivedKey, normal salt, SHA-256, with empty info with bad hash name SHA256",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-GCM length: 128 using short derivedKey, normal salt, SHA-256, with empty info with missing deriveKey usage",0,null,null],["Derived key of type name: AES-GCM length: 128 using short derivedKey, normal salt, SHA-256, with empty info with wrong (ECDH) key",0,null,null],["Derived key of type name: AES-GCM length: 192 using short derivedKey, normal salt, SHA-256, with empty info",0,null,null],["Derived key of type name: AES-GCM length: 192 using short derivedKey, normal salt, SHA-256, with empty info with bad hash name SHA256",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-GCM length: 192 using short derivedKey, normal salt, SHA-256, with empty info with missing deriveKey usage",0,null,null],["Derived key of type name: AES-GCM length: 192 using short derivedKey, normal salt, SHA-256, with empty info with wrong (ECDH) key",0,null,null],["Derived key of type name: AES-GCM length: 256 using short derivedKey, normal salt, SHA-256, with empty info",0,null,null],["Derived key of type name: AES-GCM length: 256 using short derivedKey, normal salt, SHA-256, with empty info with bad hash name SHA256",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-GCM length: 256 using short derivedKey, normal salt, SHA-256, with empty info with missing deriveKey usage",0,null,null],["Derived key of type name: AES-GCM length: 256 using short derivedKey, normal salt, SHA-256, with empty info with wrong (ECDH) key",0,null,null],["Derived key of type name: AES-KW length: 128 using short derivedKey, normal salt, SHA-256, with empty info",0,null,null],["Derived key of type name: AES-KW length: 128 using short derivedKey, normal salt, SHA-256, with empty info with bad hash name SHA256",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-KW length: 128 using short derivedKey, normal salt, SHA-256, with empty info with missing deriveKey usage",0,null,null],["Derived key of type name: AES-KW length: 128 using short derivedKey, normal salt, SHA-256, with empty info with wrong (ECDH) key",0,null,null],["Derived key of type name: AES-KW length: 192 using short derivedKey, normal salt, SHA-256, with empty info",0,null,null],["Derived key of type name: AES-KW length: 192 using short derivedKey, normal salt, SHA-256, with empty info with bad hash name SHA256",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-KW length: 192 using short derivedKey, normal salt, SHA-256, with empty info with missing deriveKey usage",0,null,null],["Derived key of type name: AES-KW length: 192 using short derivedKey, normal salt, SHA-256, with empty info with wrong (ECDH) key",0,null,null],["Derived key of type name: AES-KW length: 256 using short derivedKey, normal salt, SHA-256, with empty info",0,null,null],["Derived key of type name: AES-KW length: 256 using short derivedKey, normal salt, SHA-256, with empty info with bad hash name SHA256",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-KW length: 256 using short derivedKey, normal salt, SHA-256, with empty info with missing deriveKey usage",0,null,null],["Derived key of type name: AES-KW length: 256 using short derivedKey, normal salt, SHA-256, with empty info with wrong (ECDH) key",0,null,null],["Derived key of type name: HMAC hash: SHA-1 length: 256 using short derivedKey, normal salt, SHA-256, with empty info",0,null,null],["Derived key of type name: HMAC hash: SHA-1 length: 256 using short derivedKey, normal salt, SHA-256, with empty info with bad hash name SHA256",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: HMAC hash: SHA-1 length: 256 using short derivedKey, normal salt, SHA-256, with empty info with missing deriveKey usage",0,null,null],["Derived key of type name: HMAC hash: SHA-1 length: 256 using short derivedKey, normal salt, SHA-256, with empty info with wrong (ECDH) key",0,null,null],["Derived key of type name: HMAC hash: SHA-256 length: 256 using short derivedKey, normal salt, SHA-256, with empty info",0,null,null],["Derived key of type name: HMAC hash: SHA-256 length: 256 using short derivedKey, normal salt, SHA-256, with empty info with bad hash name SHA256",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: HMAC hash: SHA-256 length: 256 using short derivedKey, normal salt, SHA-256, with empty info with missing deriveKey usage",0,null,null],["Derived key of type name: HMAC hash: SHA-256 length: 256 using short derivedKey, normal salt, SHA-256, with empty info with wrong (ECDH) key",0,null,null],["Derived key of type name: HMAC hash: SHA-384 length: 256 using short derivedKey, normal salt, SHA-256, with empty info",0,null,null],["Derived key of type name: HMAC hash: SHA-384 length: 256 using short derivedKey, normal salt, SHA-256, with empty info with bad hash name SHA256",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: HMAC hash: SHA-384 length: 256 using short derivedKey, normal salt, SHA-256, with empty info with missing deriveKey usage",0,null,null],["Derived key of type name: HMAC hash: SHA-384 length: 256 using short derivedKey, normal salt, SHA-256, with empty info with wrong (ECDH) key",0,null,null],["Derived key of type name: HMAC hash: SHA-512 length: 256 using short derivedKey, normal salt, SHA-256, with empty info",0,null,null],["Derived key of type name: HMAC hash: SHA-512 length: 256 using short derivedKey, normal salt, SHA-256, with empty info with bad hash name SHA256",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: HMAC hash: SHA-512 length: 256 using short derivedKey, normal salt, SHA-256, with empty info with missing deriveKey usage",0,null,null],["Derived key of type name: HMAC hash: SHA-512 length: 256 using short derivedKey, normal salt, SHA-256, with empty info with wrong (ECDH) key",0,null,null],["short derivedKey, normal salt, SHA-256, with empty info with missing salt",1,"assert_equals: deriveBits missing salt correctly threw OperationError: An invalid or illegal string was specified expected \"TypeError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:128:33\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:124:36\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:123:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["short derivedKey, normal salt, SHA-256, with empty info with missing info",1,"assert_equals: deriveBits missing info correctly threw OperationError: An invalid or illegal string was specified expected \"TypeError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:138:33\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:134:36\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:133:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["short derivedKey, normal salt, SHA-256, with empty info with null length",1,"assert_equals: deriveBits with null length correctly threw OperationError: Data provided to an operation does not meet requirements expected \"TypeError\" but got \"DataError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:148:33\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:144:36\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:143:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["short derivedKey, normal salt, SHA-256, with empty info with non-multiple of 8 length",1,"assert_unreached: non-multiple of 8 length should have thrown an OperationError Reached unreachable code","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:156:33\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:154:36\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:153:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["short derivedKey, normal salt, SHA-256, with empty info with bad hash name SHA256",1,"assert_equals: deriveBits with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:170:33\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:166:36\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:164:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["short derivedKey, normal salt, SHA-256, with empty info with missing deriveBits usage",0,null,null],["short derivedKey, normal salt, SHA-256, with empty info with wrong (ECDH) key",0,null,null],["short derivedKey, normal salt, PBKDF2, with normal info with non-digest algorithm PBKDF2",0,null,null],["Derived key of type name: AES-CBC length: 128 using short derivedKey, normal salt, PBKDF2, with normal info",0,null,null],["Derived key of type name: AES-CBC length: 192 using short derivedKey, normal salt, PBKDF2, with normal info",0,null,null],["Derived key of type name: AES-CBC length: 256 using short derivedKey, normal salt, PBKDF2, with normal info",0,null,null],["Derived key of type name: AES-CTR length: 128 using short derivedKey, normal salt, PBKDF2, with normal info",0,null,null],["Derived key of type name: AES-CTR length: 192 using short derivedKey, normal salt, PBKDF2, with normal info",0,null,null],["Derived key of type name: AES-CTR length: 256 using short derivedKey, normal salt, PBKDF2, with normal info",0,null,null],["Derived key of type name: AES-GCM length: 128 using short derivedKey, normal salt, PBKDF2, with normal info",0,null,null],["Derived key of type name: AES-GCM length: 192 using short derivedKey, normal salt, PBKDF2, with normal info",0,null,null],["Derived key of type name: AES-GCM length: 256 using short derivedKey, normal salt, PBKDF2, with normal info",0,null,null],["Derived key of type name: AES-KW length: 128 using short derivedKey, normal salt, PBKDF2, with normal info",0,null,null],["Derived key of type name: AES-KW length: 192 using short derivedKey, normal salt, PBKDF2, with normal info",0,null,null],["Derived key of type name: AES-KW length: 256 using short derivedKey, normal salt, PBKDF2, with normal info",0,null,null],["Derived key of type name: HMAC hash: SHA-1 length: 256 using short derivedKey, normal salt, PBKDF2, with normal info",0,null,null],["Derived key of type name: HMAC hash: SHA-256 length: 256 using short derivedKey, normal salt, PBKDF2, with normal info",0,null,null],["Derived key of type name: HMAC hash: SHA-384 length: 256 using short derivedKey, normal salt, PBKDF2, with normal info",0,null,null],["Derived key of type name: HMAC hash: SHA-512 length: 256 using short derivedKey, normal salt, PBKDF2, with normal info",0,null,null],["short derivedKey, normal salt, PBKDF2, with empty info with non-digest algorithm PBKDF2",0,null,null],["Derived key of type name: AES-CBC length: 128 using short derivedKey, normal salt, PBKDF2, with empty info",0,null,null],["Derived key of type name: AES-CBC length: 192 using short derivedKey, normal salt, PBKDF2, with empty info",0,null,null],["Derived key of type name: AES-CBC length: 256 using short derivedKey, normal salt, PBKDF2, with empty info",0,null,null],["Derived key of type name: AES-CTR length: 128 using short derivedKey, normal salt, PBKDF2, with empty info",0,null,null],["Derived key of type name: AES-CTR length: 192 using short derivedKey, normal salt, PBKDF2, with empty info",0,null,null],["Derived key of type name: AES-CTR length: 256 using short derivedKey, normal salt, PBKDF2, with empty info",0,null,null],["Derived key of type name: AES-GCM length: 128 using short derivedKey, normal salt, PBKDF2, with empty info",0,null,null],["Derived key of type name: AES-GCM length: 192 using short derivedKey, normal salt, PBKDF2, with empty info",0,null,null],["Derived key of type name: AES-GCM length: 256 using short derivedKey, normal salt, PBKDF2, with empty info",0,null,null],["Derived key of type name: AES-KW length: 128 using short derivedKey, normal salt, PBKDF2, with empty info",0,null,null],["Derived key of type name: AES-KW length: 192 using short derivedKey, normal salt, PBKDF2, with empty info",0,null,null],["Derived key of type name: AES-KW length: 256 using short derivedKey, normal salt, PBKDF2, with empty info",0,null,null],["Derived key of type name: HMAC hash: SHA-1 length: 256 using short derivedKey, normal salt, PBKDF2, with empty info",0,null,null],["Derived key of type name: HMAC hash: SHA-256 length: 256 using short derivedKey, normal salt, PBKDF2, with empty info",0,null,null],["Derived key of type name: HMAC hash: SHA-384 length: 256 using short derivedKey, normal salt, PBKDF2, with empty info",0,null,null],["Derived key of type name: HMAC hash: SHA-512 length: 256 using short derivedKey, normal salt, PBKDF2, with empty info",0,null,null],["short derivedKey, empty salt, SHA-384, with normal info",0,null,null],["short derivedKey, empty salt, SHA-384, with normal info with 0 length",1,"assert_equals: deriveBits with 0 length correctly threw OperationError: Data provided to an operation does not meet requirements expected \"OperationError\" but got \"DataError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:54:33\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:50:36\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:49:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-CBC length: 128 using short derivedKey, empty salt, SHA-384, with normal info",0,null,null],["Derived key of type name: AES-CBC length: 128 using short derivedKey, empty salt, SHA-384, with normal info with bad hash name SHA384",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-CBC length: 128 using short derivedKey, empty salt, SHA-384, with normal info with missing deriveKey usage",0,null,null],["Derived key of type name: AES-CBC length: 128 using short derivedKey, empty salt, SHA-384, with normal info with wrong (ECDH) key",0,null,null],["Derived key of type name: AES-CBC length: 192 using short derivedKey, empty salt, SHA-384, with normal info",0,null,null],["Derived key of type name: AES-CBC length: 192 using short derivedKey, empty salt, SHA-384, with normal info with bad hash name SHA384",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-CBC length: 192 using short derivedKey, empty salt, SHA-384, with normal info with missing deriveKey usage",0,null,null],["Derived key of type name: AES-CBC length: 192 using short derivedKey, empty salt, SHA-384, with normal info with wrong (ECDH) key",0,null,null],["Derived key of type name: AES-CBC length: 256 using short derivedKey, empty salt, SHA-384, with normal info",0,null,null],["Derived key of type name: AES-CBC length: 256 using short derivedKey, empty salt, SHA-384, with normal info with bad hash name SHA384",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-CBC length: 256 using short derivedKey, empty salt, SHA-384, with normal info with missing deriveKey usage",0,null,null],["Derived key of type name: AES-CBC length: 256 using short derivedKey, empty salt, SHA-384, with normal info with wrong (ECDH) key",0,null,null],["Derived key of type name: AES-CTR length: 128 using short derivedKey, empty salt, SHA-384, with normal info",0,null,null],["Derived key of type name: AES-CTR length: 128 using short derivedKey, empty salt, SHA-384, with normal info with bad hash name SHA384",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-CTR length: 128 using short derivedKey, empty salt, SHA-384, with normal info with missing deriveKey usage",0,null,null],["Derived key of type name: AES-CTR length: 128 using short derivedKey, empty salt, SHA-384, with normal info with wrong (ECDH) key",0,null,null],["Derived key of type name: AES-CTR length: 192 using short derivedKey, empty salt, SHA-384, with normal info",0,null,null],["Derived key of type name: AES-CTR length: 192 using short derivedKey, empty salt, SHA-384, with normal info with bad hash name SHA384",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-CTR length: 192 using short derivedKey, empty salt, SHA-384, with normal info with missing deriveKey usage",0,null,null],["Derived key of type name: AES-CTR length: 192 using short derivedKey, empty salt, SHA-384, with normal info with wrong (ECDH) key",0,null,null],["Derived key of type name: AES-CTR length: 256 using short derivedKey, empty salt, SHA-384, with normal info",0,null,null],["Derived key of type name: AES-CTR length: 256 using short derivedKey, empty salt, SHA-384, with normal info with bad hash name SHA384",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-CTR length: 256 using short derivedKey, empty salt, SHA-384, with normal info with missing deriveKey usage",0,null,null],["Derived key of type name: AES-CTR length: 256 using short derivedKey, empty salt, SHA-384, with normal info with wrong (ECDH) key",0,null,null],["Derived key of type name: AES-GCM length: 128 using short derivedKey, empty salt, SHA-384, with normal info",0,null,null],["Derived key of type name: AES-GCM length: 128 using short derivedKey, empty salt, SHA-384, with normal info with bad hash name SHA384",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-GCM length: 128 using short derivedKey, empty salt, SHA-384, with normal info with missing deriveKey usage",0,null,null],["Derived key of type name: AES-GCM length: 128 using short derivedKey, empty salt, SHA-384, with normal info with wrong (ECDH) key",0,null,null],["Derived key of type name: AES-GCM length: 192 using short derivedKey, empty salt, SHA-384, with normal info",0,null,null],["Derived key of type name: AES-GCM length: 192 using short derivedKey, empty salt, SHA-384, with normal info with bad hash name SHA384",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-GCM length: 192 using short derivedKey, empty salt, SHA-384, with normal info with missing deriveKey usage",0,null,null],["Derived key of type name: AES-GCM length: 192 using short derivedKey, empty salt, SHA-384, with normal info with wrong (ECDH) key",0,null,null],["Derived key of type name: AES-GCM length: 256 using short derivedKey, empty salt, SHA-384, with normal info",0,null,null],["Derived key of type name: AES-GCM length: 256 using short derivedKey, empty salt, SHA-384, with normal info with bad hash name SHA384",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-GCM length: 256 using short derivedKey, empty salt, SHA-384, with normal info with missing deriveKey usage",0,null,null],["Derived key of type name: AES-GCM length: 256 using short derivedKey, empty salt, SHA-384, with normal info with wrong (ECDH) key",0,null,null],["Derived key of type name: AES-KW length: 128 using short derivedKey, empty salt, SHA-384, with normal info",0,null,null],["Derived key of type name: AES-KW length: 128 using short derivedKey, empty salt, SHA-384, with normal info with bad hash name SHA384",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-KW length: 128 using short derivedKey, empty salt, SHA-384, with normal info with missing deriveKey usage",0,null,null],["Derived key of type name: AES-KW length: 128 using short derivedKey, empty salt, SHA-384, with normal info with wrong (ECDH) key",0,null,null],["Derived key of type name: AES-KW length: 192 using short derivedKey, empty salt, SHA-384, with normal info",0,null,null],["Derived key of type name: AES-KW length: 192 using short derivedKey, empty salt, SHA-384, with normal info with bad hash name SHA384",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-KW length: 192 using short derivedKey, empty salt, SHA-384, with normal info with missing deriveKey usage",0,null,null],["Derived key of type name: AES-KW length: 192 using short derivedKey, empty salt, SHA-384, with normal info with wrong (ECDH) key",0,null,null],["Derived key of type name: AES-KW length: 256 using short derivedKey, empty salt, SHA-384, with normal info",0,null,null],["Derived key of type name: AES-KW length: 256 using short derivedKey, empty salt, SHA-384, with normal info with bad hash name SHA384",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-KW length: 256 using short derivedKey, empty salt, SHA-384, with normal info with missing deriveKey usage",0,null,null],["Derived key of type name: AES-KW length: 256 using short derivedKey, empty salt, SHA-384, with normal info with wrong (ECDH) key",0,null,null],["Derived key of type name: HMAC hash: SHA-1 length: 256 using short derivedKey, empty salt, SHA-384, with normal info",0,null,null],["Derived key of type name: HMAC hash: SHA-1 length: 256 using short derivedKey, empty salt, SHA-384, with normal info with bad hash name SHA384",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: HMAC hash: SHA-1 length: 256 using short derivedKey, empty salt, SHA-384, with normal info with missing deriveKey usage",0,null,null],["Derived key of type name: HMAC hash: SHA-1 length: 256 using short derivedKey, empty salt, SHA-384, with normal info with wrong (ECDH) key",0,null,null],["Derived key of type name: HMAC hash: SHA-256 length: 256 using short derivedKey, empty salt, SHA-384, with normal info",0,null,null],["Derived key of type name: HMAC hash: SHA-256 length: 256 using short derivedKey, empty salt, SHA-384, with normal info with bad hash name SHA384",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: HMAC hash: SHA-256 length: 256 using short derivedKey, empty salt, SHA-384, with normal info with missing deriveKey usage",0,null,null],["Derived key of type name: HMAC hash: SHA-256 length: 256 using short derivedKey, empty salt, SHA-384, with normal info with wrong (ECDH) key",0,null,null],["Derived key of type name: HMAC hash: SHA-384 length: 256 using short derivedKey, empty salt, SHA-384, with normal info",0,null,null],["Derived key of type name: HMAC hash: SHA-384 length: 256 using short derivedKey, empty salt, SHA-384, with normal info with bad hash name SHA384",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: HMAC hash: SHA-384 length: 256 using short derivedKey, empty salt, SHA-384, with normal info with missing deriveKey usage",0,null,null],["Derived key of type name: HMAC hash: SHA-384 length: 256 using short derivedKey, empty salt, SHA-384, with normal info with wrong (ECDH) key",0,null,null],["Derived key of type name: HMAC hash: SHA-512 length: 256 using short derivedKey, empty salt, SHA-384, with normal info",0,null,null],["Derived key of type name: HMAC hash: SHA-512 length: 256 using short derivedKey, empty salt, SHA-384, with normal info with bad hash name SHA384",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: HMAC hash: SHA-512 length: 256 using short derivedKey, empty salt, SHA-384, with normal info with missing deriveKey usage",0,null,null],["Derived key of type name: HMAC hash: SHA-512 length: 256 using short derivedKey, empty salt, SHA-384, with normal info with wrong (ECDH) key",0,null,null],["short derivedKey, empty salt, SHA-384, with normal info with missing salt",1,"assert_equals: deriveBits missing salt correctly threw OperationError: An invalid or illegal string was specified expected \"TypeError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:128:33\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:124:36\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:123:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["short derivedKey, empty salt, SHA-384, with normal info with missing info",1,"assert_equals: deriveBits missing info correctly threw OperationError: An invalid or illegal string was specified expected \"TypeError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:138:33\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:134:36\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:133:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["short derivedKey, empty salt, SHA-384, with normal info with null length",1,"assert_equals: deriveBits with null length correctly threw OperationError: Data provided to an operation does not meet requirements expected \"TypeError\" but got \"DataError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:148:33\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:144:36\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:143:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["short derivedKey, empty salt, SHA-384, with normal info with non-multiple of 8 length",1,"assert_unreached: non-multiple of 8 length should have thrown an OperationError Reached unreachable code","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:156:33\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:154:36\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:153:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["short derivedKey, empty salt, SHA-384, with normal info with bad hash name SHA384",1,"assert_equals: deriveBits with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:170:33\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:166:36\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:164:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["short derivedKey, empty salt, SHA-384, with normal info with missing deriveBits usage",0,null,null],["short derivedKey, empty salt, SHA-384, with normal info with wrong (ECDH) key",0,null,null],["short derivedKey, empty salt, SHA-384, with empty info",0,null,null],["short derivedKey, empty salt, SHA-384, with empty info with 0 length",1,"assert_equals: deriveBits with 0 length correctly threw OperationError: Data provided to an operation does not meet requirements expected \"OperationError\" but got \"DataError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:54:33\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:50:36\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:49:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-CBC length: 128 using short derivedKey, empty salt, SHA-384, with empty info",0,null,null],["Derived key of type name: AES-CBC length: 128 using short derivedKey, empty salt, SHA-384, with empty info with bad hash name SHA384",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-CBC length: 128 using short derivedKey, empty salt, SHA-384, with empty info with missing deriveKey usage",0,null,null],["Derived key of type name: AES-CBC length: 128 using short derivedKey, empty salt, SHA-384, with empty info with wrong (ECDH) key",0,null,null],["Derived key of type name: AES-CBC length: 192 using short derivedKey, empty salt, SHA-384, with empty info",0,null,null],["Derived key of type name: AES-CBC length: 192 using short derivedKey, empty salt, SHA-384, with empty info with bad hash name SHA384",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-CBC length: 192 using short derivedKey, empty salt, SHA-384, with empty info with missing deriveKey usage",0,null,null],["Derived key of type name: AES-CBC length: 192 using short derivedKey, empty salt, SHA-384, with empty info with wrong (ECDH) key",0,null,null],["Derived key of type name: AES-CBC length: 256 using short derivedKey, empty salt, SHA-384, with empty info",0,null,null],["Derived key of type name: AES-CBC length: 256 using short derivedKey, empty salt, SHA-384, with empty info with bad hash name SHA384",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-CBC length: 256 using short derivedKey, empty salt, SHA-384, with empty info with missing deriveKey usage",0,null,null],["Derived key of type name: AES-CBC length: 256 using short derivedKey, empty salt, SHA-384, with empty info with wrong (ECDH) key",0,null,null],["Derived key of type name: AES-CTR length: 128 using short derivedKey, empty salt, SHA-384, with empty info",0,null,null],["Derived key of type name: AES-CTR length: 128 using short derivedKey, empty salt, SHA-384, with empty info with bad hash name SHA384",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-CTR length: 128 using short derivedKey, empty salt, SHA-384, with empty info with missing deriveKey usage",0,null,null],["Derived key of type name: AES-CTR length: 128 using short derivedKey, empty salt, SHA-384, with empty info with wrong (ECDH) key",0,null,null],["Derived key of type name: AES-CTR length: 192 using short derivedKey, empty salt, SHA-384, with empty info",0,null,null],["Derived key of type name: AES-CTR length: 192 using short derivedKey, empty salt, SHA-384, with empty info with bad hash name SHA384",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-CTR length: 192 using short derivedKey, empty salt, SHA-384, with empty info with missing deriveKey usage",0,null,null],["Derived key of type name: AES-CTR length: 192 using short derivedKey, empty salt, SHA-384, with empty info with wrong (ECDH) key",0,null,null],["Derived key of type name: AES-CTR length: 256 using short derivedKey, empty salt, SHA-384, with empty info",0,null,null],["Derived key of type name: AES-CTR length: 256 using short derivedKey, empty salt, SHA-384, with empty info with bad hash name SHA384",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-CTR length: 256 using short derivedKey, empty salt, SHA-384, with empty info with missing deriveKey usage",0,null,null],["Derived key of type name: AES-CTR length: 256 using short derivedKey, empty salt, SHA-384, with empty info with wrong (ECDH) key",0,null,null],["Derived key of type name: AES-GCM length: 128 using short derivedKey, empty salt, SHA-384, with empty info",0,null,null],["Derived key of type name: AES-GCM length: 128 using short derivedKey, empty salt, SHA-384, with empty info with bad hash name SHA384",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-GCM length: 128 using short derivedKey, empty salt, SHA-384, with empty info with missing deriveKey usage",0,null,null],["Derived key of type name: AES-GCM length: 128 using short derivedKey, empty salt, SHA-384, with empty info with wrong (ECDH) key",0,null,null],["Derived key of type name: AES-GCM length: 192 using short derivedKey, empty salt, SHA-384, with empty info",0,null,null],["Derived key of type name: AES-GCM length: 192 using short derivedKey, empty salt, SHA-384, with empty info with bad hash name SHA384",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-GCM length: 192 using short derivedKey, empty salt, SHA-384, with empty info with missing deriveKey usage",0,null,null],["Derived key of type name: AES-GCM length: 192 using short derivedKey, empty salt, SHA-384, with empty info with wrong (ECDH) key",0,null,null],["Derived key of type name: AES-GCM length: 256 using short derivedKey, empty salt, SHA-384, with empty info",0,null,null],["Derived key of type name: AES-GCM length: 256 using short derivedKey, empty salt, SHA-384, with empty info with bad hash name SHA384",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-GCM length: 256 using short derivedKey, empty salt, SHA-384, with empty info with missing deriveKey usage",0,null,null],["Derived key of type name: AES-GCM length: 256 using short derivedKey, empty salt, SHA-384, with empty info with wrong (ECDH) key",0,null,null],["Derived key of type name: AES-KW length: 128 using short derivedKey, empty salt, SHA-384, with empty info",0,null,null],["Derived key of type name: AES-KW length: 128 using short derivedKey, empty salt, SHA-384, with empty info with bad hash name SHA384",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-KW length: 128 using short derivedKey, empty salt, SHA-384, with empty info with missing deriveKey usage",0,null,null],["Derived key of type name: AES-KW length: 128 using short derivedKey, empty salt, SHA-384, with empty info with wrong (ECDH) key",0,null,null],["Derived key of type name: AES-KW length: 192 using short derivedKey, empty salt, SHA-384, with empty info",0,null,null],["Derived key of type name: AES-KW length: 192 using short derivedKey, empty salt, SHA-384, with empty info with bad hash name SHA384",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-KW length: 192 using short derivedKey, empty salt, SHA-384, with empty info with missing deriveKey usage",0,null,null],["Derived key of type name: AES-KW length: 192 using short derivedKey, empty salt, SHA-384, with empty info with wrong (ECDH) key",0,null,null],["Derived key of type name: AES-KW length: 256 using short derivedKey, empty salt, SHA-384, with empty info",0,null,null],["Derived key of type name: AES-KW length: 256 using short derivedKey, empty salt, SHA-384, with empty info with bad hash name SHA384",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-KW length: 256 using short derivedKey, empty salt, SHA-384, with empty info with missing deriveKey usage",0,null,null],["Derived key of type name: AES-KW length: 256 using short derivedKey, empty salt, SHA-384, with empty info with wrong (ECDH) key",0,null,null],["Derived key of type name: HMAC hash: SHA-1 length: 256 using short derivedKey, empty salt, SHA-384, with empty info",0,null,null],["Derived key of type name: HMAC hash: SHA-1 length: 256 using short derivedKey, empty salt, SHA-384, with empty info with bad hash name SHA384",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: HMAC hash: SHA-1 length: 256 using short derivedKey, empty salt, SHA-384, with empty info with missing deriveKey usage",0,null,null],["Derived key of type name: HMAC hash: SHA-1 length: 256 using short derivedKey, empty salt, SHA-384, with empty info with wrong (ECDH) key",0,null,null],["Derived key of type name: HMAC hash: SHA-256 length: 256 using short derivedKey, empty salt, SHA-384, with empty info",0,null,null],["Derived key of type name: HMAC hash: SHA-256 length: 256 using short derivedKey, empty salt, SHA-384, with empty info with bad hash name SHA384",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: HMAC hash: SHA-256 length: 256 using short derivedKey, empty salt, SHA-384, with empty info with missing deriveKey usage",0,null,null],["Derived key of type name: HMAC hash: SHA-256 length: 256 using short derivedKey, empty salt, SHA-384, with empty info with wrong (ECDH) key",0,null,null],["Derived key of type name: HMAC hash: SHA-384 length: 256 using short derivedKey, empty salt, SHA-384, with empty info",0,null,null],["Derived key of type name: HMAC hash: SHA-384 length: 256 using short derivedKey, empty salt, SHA-384, with empty info with bad hash name SHA384",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: HMAC hash: SHA-384 length: 256 using short derivedKey, empty salt, SHA-384, with empty info with missing deriveKey usage",0,null,null],["Derived key of type name: HMAC hash: SHA-384 length: 256 using short derivedKey, empty salt, SHA-384, with empty info with wrong (ECDH) key",0,null,null],["Derived key of type name: HMAC hash: SHA-512 length: 256 using short derivedKey, empty salt, SHA-384, with empty info",0,null,null],["Derived key of type name: HMAC hash: SHA-512 length: 256 using short derivedKey, empty salt, SHA-384, with empty info with bad hash name SHA384",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: HMAC hash: SHA-512 length: 256 using short derivedKey, empty salt, SHA-384, with empty info with missing deriveKey usage",0,null,null],["Derived key of type name: HMAC hash: SHA-512 length: 256 using short derivedKey, empty salt, SHA-384, with empty info with wrong (ECDH) key",0,null,null],["short derivedKey, empty salt, SHA-384, with empty info with missing salt",1,"assert_equals: deriveBits missing salt correctly threw OperationError: An invalid or illegal string was specified expected \"TypeError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:128:33\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:124:36\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:123:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["short derivedKey, empty salt, SHA-384, with empty info with missing info",1,"assert_equals: deriveBits missing info correctly threw OperationError: An invalid or illegal string was specified expected \"TypeError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:138:33\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:134:36\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:133:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["short derivedKey, empty salt, SHA-384, with empty info with null length",1,"assert_equals: deriveBits with null length correctly threw OperationError: Data provided to an operation does not meet requirements expected \"TypeError\" but got \"DataError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:148:33\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:144:36\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:143:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["short derivedKey, empty salt, SHA-384, with empty info with non-multiple of 8 length",1,"assert_unreached: non-multiple of 8 length should have thrown an OperationError Reached unreachable code","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:156:33\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:154:36\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:153:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["short derivedKey, empty salt, SHA-384, with empty info with bad hash name SHA384",1,"assert_equals: deriveBits with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:170:33\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:166:36\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:164:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["short derivedKey, empty salt, SHA-384, with empty info with missing deriveBits usage",0,null,null],["short derivedKey, empty salt, SHA-384, with empty info with wrong (ECDH) key",0,null,null],["short derivedKey, empty salt, SHA-512, with normal info",0,null,null],["short derivedKey, empty salt, SHA-512, with normal info with 0 length",1,"assert_equals: deriveBits with 0 length correctly threw OperationError: Data provided to an operation does not meet requirements expected \"OperationError\" but got \"DataError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:54:33\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:50:36\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:49:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-CBC length: 128 using short derivedKey, empty salt, SHA-512, with normal info",0,null,null],["Derived key of type name: AES-CBC length: 128 using short derivedKey, empty salt, SHA-512, with normal info with bad hash name SHA512",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-CBC length: 128 using short derivedKey, empty salt, SHA-512, with normal info with missing deriveKey usage",0,null,null],["Derived key of type name: AES-CBC length: 128 using short derivedKey, empty salt, SHA-512, with normal info with wrong (ECDH) key",0,null,null],["Derived key of type name: AES-CBC length: 192 using short derivedKey, empty salt, SHA-512, with normal info",0,null,null],["Derived key of type name: AES-CBC length: 192 using short derivedKey, empty salt, SHA-512, with normal info with bad hash name SHA512",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-CBC length: 192 using short derivedKey, empty salt, SHA-512, with normal info with missing deriveKey usage",0,null,null],["Derived key of type name: AES-CBC length: 192 using short derivedKey, empty salt, SHA-512, with normal info with wrong (ECDH) key",0,null,null],["Derived key of type name: AES-CBC length: 256 using short derivedKey, empty salt, SHA-512, with normal info",0,null,null],["Derived key of type name: AES-CBC length: 256 using short derivedKey, empty salt, SHA-512, with normal info with bad hash name SHA512",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-CBC length: 256 using short derivedKey, empty salt, SHA-512, with normal info with missing deriveKey usage",0,null,null],["Derived key of type name: AES-CBC length: 256 using short derivedKey, empty salt, SHA-512, with normal info with wrong (ECDH) key",0,null,null],["Derived key of type name: AES-CTR length: 128 using short derivedKey, empty salt, SHA-512, with normal info",0,null,null],["Derived key of type name: AES-CTR length: 128 using short derivedKey, empty salt, SHA-512, with normal info with bad hash name SHA512",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-CTR length: 128 using short derivedKey, empty salt, SHA-512, with normal info with missing deriveKey usage",0,null,null],["Derived key of type name: AES-CTR length: 128 using short derivedKey, empty salt, SHA-512, with normal info with wrong (ECDH) key",0,null,null],["Derived key of type name: AES-CTR length: 192 using short derivedKey, empty salt, SHA-512, with normal info",0,null,null],["Derived key of type name: AES-CTR length: 192 using short derivedKey, empty salt, SHA-512, with normal info with bad hash name SHA512",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-CTR length: 192 using short derivedKey, empty salt, SHA-512, with normal info with missing deriveKey usage",0,null,null],["Derived key of type name: AES-CTR length: 192 using short derivedKey, empty salt, SHA-512, with normal info with wrong (ECDH) key",0,null,null],["Derived key of type name: AES-CTR length: 256 using short derivedKey, empty salt, SHA-512, with normal info",0,null,null],["Derived key of type name: AES-CTR length: 256 using short derivedKey, empty salt, SHA-512, with normal info with bad hash name SHA512",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-CTR length: 256 using short derivedKey, empty salt, SHA-512, with normal info with missing deriveKey usage",0,null,null],["Derived key of type name: AES-CTR length: 256 using short derivedKey, empty salt, SHA-512, with normal info with wrong (ECDH) key",0,null,null],["Derived key of type name: AES-GCM length: 128 using short derivedKey, empty salt, SHA-512, with normal info",0,null,null],["Derived key of type name: AES-GCM length: 128 using short derivedKey, empty salt, SHA-512, with normal info with bad hash name SHA512",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-GCM length: 128 using short derivedKey, empty salt, SHA-512, with normal info with missing deriveKey usage",0,null,null],["Derived key of type name: AES-GCM length: 128 using short derivedKey, empty salt, SHA-512, with normal info with wrong (ECDH) key",0,null,null],["Derived key of type name: AES-GCM length: 192 using short derivedKey, empty salt, SHA-512, with normal info",0,null,null],["Derived key of type name: AES-GCM length: 192 using short derivedKey, empty salt, SHA-512, with normal info with bad hash name SHA512",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-GCM length: 192 using short derivedKey, empty salt, SHA-512, with normal info with missing deriveKey usage",0,null,null],["Derived key of type name: AES-GCM length: 192 using short derivedKey, empty salt, SHA-512, with normal info with wrong (ECDH) key",0,null,null],["Derived key of type name: AES-GCM length: 256 using short derivedKey, empty salt, SHA-512, with normal info",0,null,null],["Derived key of type name: AES-GCM length: 256 using short derivedKey, empty salt, SHA-512, with normal info with bad hash name SHA512",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-GCM length: 256 using short derivedKey, empty salt, SHA-512, with normal info with missing deriveKey usage",0,null,null],["Derived key of type name: AES-GCM length: 256 using short derivedKey, empty salt, SHA-512, with normal info with wrong (ECDH) key",0,null,null],["Derived key of type name: AES-KW length: 128 using short derivedKey, empty salt, SHA-512, with normal info",0,null,null],["Derived key of type name: AES-KW length: 128 using short derivedKey, empty salt, SHA-512, with normal info with bad hash name SHA512",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-KW length: 128 using short derivedKey, empty salt, SHA-512, with normal info with missing deriveKey usage",0,null,null],["Derived key of type name: AES-KW length: 128 using short derivedKey, empty salt, SHA-512, with normal info with wrong (ECDH) key",0,null,null],["Derived key of type name: AES-KW length: 192 using short derivedKey, empty salt, SHA-512, with normal info",0,null,null],["Derived key of type name: AES-KW length: 192 using short derivedKey, empty salt, SHA-512, with normal info with bad hash name SHA512",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-KW length: 192 using short derivedKey, empty salt, SHA-512, with normal info with missing deriveKey usage",0,null,null],["Derived key of type name: AES-KW length: 192 using short derivedKey, empty salt, SHA-512, with normal info with wrong (ECDH) key",0,null,null],["Derived key of type name: AES-KW length: 256 using short derivedKey, empty salt, SHA-512, with normal info",0,null,null],["Derived key of type name: AES-KW length: 256 using short derivedKey, empty salt, SHA-512, with normal info with bad hash name SHA512",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-KW length: 256 using short derivedKey, empty salt, SHA-512, with normal info with missing deriveKey usage",0,null,null],["Derived key of type name: AES-KW length: 256 using short derivedKey, empty salt, SHA-512, with normal info with wrong (ECDH) key",0,null,null],["Derived key of type name: HMAC hash: SHA-1 length: 256 using short derivedKey, empty salt, SHA-512, with normal info",0,null,null],["Derived key of type name: HMAC hash: SHA-1 length: 256 using short derivedKey, empty salt, SHA-512, with normal info with bad hash name SHA512",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: HMAC hash: SHA-1 length: 256 using short derivedKey, empty salt, SHA-512, with normal info with missing deriveKey usage",0,null,null],["Derived key of type name: HMAC hash: SHA-1 length: 256 using short derivedKey, empty salt, SHA-512, with normal info with wrong (ECDH) key",0,null,null],["Derived key of type name: HMAC hash: SHA-256 length: 256 using short derivedKey, empty salt, SHA-512, with normal info",0,null,null],["Derived key of type name: HMAC hash: SHA-256 length: 256 using short derivedKey, empty salt, SHA-512, with normal info with bad hash name SHA512",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: HMAC hash: SHA-256 length: 256 using short derivedKey, empty salt, SHA-512, with normal info with missing deriveKey usage",0,null,null],["Derived key of type name: HMAC hash: SHA-256 length: 256 using short derivedKey, empty salt, SHA-512, with normal info with wrong (ECDH) key",0,null,null],["Derived key of type name: HMAC hash: SHA-384 length: 256 using short derivedKey, empty salt, SHA-512, with normal info",0,null,null],["Derived key of type name: HMAC hash: SHA-384 length: 256 using short derivedKey, empty salt, SHA-512, with normal info with bad hash name SHA512",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: HMAC hash: SHA-384 length: 256 using short derivedKey, empty salt, SHA-512, with normal info with missing deriveKey usage",0,null,null],["Derived key of type name: HMAC hash: SHA-384 length: 256 using short derivedKey, empty salt, SHA-512, with normal info with wrong (ECDH) key",0,null,null],["Derived key of type name: HMAC hash: SHA-512 length: 256 using short derivedKey, empty salt, SHA-512, with normal info",0,null,null],["Derived key of type name: HMAC hash: SHA-512 length: 256 using short derivedKey, empty salt, SHA-512, with normal info with bad hash name SHA512",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: HMAC hash: SHA-512 length: 256 using short derivedKey, empty salt, SHA-512, with normal info with missing deriveKey usage",0,null,null],["Derived key of type name: HMAC hash: SHA-512 length: 256 using short derivedKey, empty salt, SHA-512, with normal info with wrong (ECDH) key",0,null,null],["short derivedKey, empty salt, SHA-512, with normal info with missing salt",1,"assert_equals: deriveBits missing salt correctly threw OperationError: An invalid or illegal string was specified expected \"TypeError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:128:33\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:124:36\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:123:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["short derivedKey, empty salt, SHA-512, with normal info with missing info",1,"assert_equals: deriveBits missing info correctly threw OperationError: An invalid or illegal string was specified expected \"TypeError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:138:33\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:134:36\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:133:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["short derivedKey, empty salt, SHA-512, with normal info with null length",1,"assert_equals: deriveBits with null length correctly threw OperationError: Data provided to an operation does not meet requirements expected \"TypeError\" but got \"DataError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:148:33\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:144:36\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:143:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["short derivedKey, empty salt, SHA-512, with normal info with non-multiple of 8 length",1,"assert_unreached: non-multiple of 8 length should have thrown an OperationError Reached unreachable code","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:156:33\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:154:36\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:153:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["short derivedKey, empty salt, SHA-512, with normal info with bad hash name SHA512",1,"assert_equals: deriveBits with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:170:33\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:166:36\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:164:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["short derivedKey, empty salt, SHA-512, with normal info with missing deriveBits usage",0,null,null],["short derivedKey, empty salt, SHA-512, with normal info with wrong (ECDH) key",0,null,null],["short derivedKey, empty salt, SHA-512, with empty info",0,null,null],["short derivedKey, empty salt, SHA-512, with empty info with 0 length",1,"assert_equals: deriveBits with 0 length correctly threw OperationError: Data provided to an operation does not meet requirements expected \"OperationError\" but got \"DataError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:54:33\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:50:36\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:49:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-CBC length: 128 using short derivedKey, empty salt, SHA-512, with empty info",0,null,null],["Derived key of type name: AES-CBC length: 128 using short derivedKey, empty salt, SHA-512, with empty info with bad hash name SHA512",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-CBC length: 128 using short derivedKey, empty salt, SHA-512, with empty info with missing deriveKey usage",0,null,null],["Derived key of type name: AES-CBC length: 128 using short derivedKey, empty salt, SHA-512, with empty info with wrong (ECDH) key",0,null,null],["Derived key of type name: AES-CBC length: 192 using short derivedKey, empty salt, SHA-512, with empty info",0,null,null],["Derived key of type name: AES-CBC length: 192 using short derivedKey, empty salt, SHA-512, with empty info with bad hash name SHA512",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-CBC length: 192 using short derivedKey, empty salt, SHA-512, with empty info with missing deriveKey usage",0,null,null],["Derived key of type name: AES-CBC length: 192 using short derivedKey, empty salt, SHA-512, with empty info with wrong (ECDH) key",0,null,null],["Derived key of type name: AES-CBC length: 256 using short derivedKey, empty salt, SHA-512, with empty info",0,null,null],["Derived key of type name: AES-CBC length: 256 using short derivedKey, empty salt, SHA-512, with empty info with bad hash name SHA512",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-CBC length: 256 using short derivedKey, empty salt, SHA-512, with empty info with missing deriveKey usage",0,null,null],["Derived key of type name: AES-CBC length: 256 using short derivedKey, empty salt, SHA-512, with empty info with wrong (ECDH) key",0,null,null],["Derived key of type name: AES-CTR length: 128 using short derivedKey, empty salt, SHA-512, with empty info",0,null,null],["Derived key of type name: AES-CTR length: 128 using short derivedKey, empty salt, SHA-512, with empty info with bad hash name SHA512",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-CTR length: 128 using short derivedKey, empty salt, SHA-512, with empty info with missing deriveKey usage",0,null,null],["Derived key of type name: AES-CTR length: 128 using short derivedKey, empty salt, SHA-512, with empty info with wrong (ECDH) key",0,null,null],["Derived key of type name: AES-CTR length: 192 using short derivedKey, empty salt, SHA-512, with empty info",0,null,null],["Derived key of type name: AES-CTR length: 192 using short derivedKey, empty salt, SHA-512, with empty info with bad hash name SHA512",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-CTR length: 192 using short derivedKey, empty salt, SHA-512, with empty info with missing deriveKey usage",0,null,null],["Derived key of type name: AES-CTR length: 192 using short derivedKey, empty salt, SHA-512, with empty info with wrong (ECDH) key",0,null,null],["Derived key of type name: AES-CTR length: 256 using short derivedKey, empty salt, SHA-512, with empty info",0,null,null],["Derived key of type name: AES-CTR length: 256 using short derivedKey, empty salt, SHA-512, with empty info with bad hash name SHA512",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-CTR length: 256 using short derivedKey, empty salt, SHA-512, with empty info with missing deriveKey usage",0,null,null],["Derived key of type name: AES-CTR length: 256 using short derivedKey, empty salt, SHA-512, with empty info with wrong (ECDH) key",0,null,null],["Derived key of type name: AES-GCM length: 128 using short derivedKey, empty salt, SHA-512, with empty info",0,null,null],["Derived key of type name: AES-GCM length: 128 using short derivedKey, empty salt, SHA-512, with empty info with bad hash name SHA512",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-GCM length: 128 using short derivedKey, empty salt, SHA-512, with empty info with missing deriveKey usage",0,null,null],["Derived key of type name: AES-GCM length: 128 using short derivedKey, empty salt, SHA-512, with empty info with wrong (ECDH) key",0,null,null],["Derived key of type name: AES-GCM length: 192 using short derivedKey, empty salt, SHA-512, with empty info",0,null,null],["Derived key of type name: AES-GCM length: 192 using short derivedKey, empty salt, SHA-512, with empty info with bad hash name SHA512",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-GCM length: 192 using short derivedKey, empty salt, SHA-512, with empty info with missing deriveKey usage",0,null,null],["Derived key of type name: AES-GCM length: 192 using short derivedKey, empty salt, SHA-512, with empty info with wrong (ECDH) key",0,null,null],["Derived key of type name: AES-GCM length: 256 using short derivedKey, empty salt, SHA-512, with empty info",0,null,null],["Derived key of type name: AES-GCM length: 256 using short derivedKey, empty salt, SHA-512, with empty info with bad hash name SHA512",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-GCM length: 256 using short derivedKey, empty salt, SHA-512, with empty info with missing deriveKey usage",0,null,null],["Derived key of type name: AES-GCM length: 256 using short derivedKey, empty salt, SHA-512, with empty info with wrong (ECDH) key",0,null,null],["Derived key of type name: AES-KW length: 128 using short derivedKey, empty salt, SHA-512, with empty info",0,null,null],["Derived key of type name: AES-KW length: 128 using short derivedKey, empty salt, SHA-512, with empty info with bad hash name SHA512",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-KW length: 128 using short derivedKey, empty salt, SHA-512, with empty info with missing deriveKey usage",0,null,null],["Derived key of type name: AES-KW length: 128 using short derivedKey, empty salt, SHA-512, with empty info with wrong (ECDH) key",0,null,null],["Derived key of type name: AES-KW length: 192 using short derivedKey, empty salt, SHA-512, with empty info",0,null,null],["Derived key of type name: AES-KW length: 192 using short derivedKey, empty salt, SHA-512, with empty info with bad hash name SHA512",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-KW length: 192 using short derivedKey, empty salt, SHA-512, with empty info with missing deriveKey usage",0,null,null],["Derived key of type name: AES-KW length: 192 using short derivedKey, empty salt, SHA-512, with empty info with wrong (ECDH) key",0,null,null],["Derived key of type name: AES-KW length: 256 using short derivedKey, empty salt, SHA-512, with empty info",0,null,null],["Derived key of type name: AES-KW length: 256 using short derivedKey, empty salt, SHA-512, with empty info with bad hash name SHA512",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-KW length: 256 using short derivedKey, empty salt, SHA-512, with empty info with missing deriveKey usage",0,null,null],["Derived key of type name: AES-KW length: 256 using short derivedKey, empty salt, SHA-512, with empty info with wrong (ECDH) key",0,null,null],["Derived key of type name: HMAC hash: SHA-1 length: 256 using short derivedKey, empty salt, SHA-512, with empty info",0,null,null],["Derived key of type name: HMAC hash: SHA-1 length: 256 using short derivedKey, empty salt, SHA-512, with empty info with bad hash name SHA512",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: HMAC hash: SHA-1 length: 256 using short derivedKey, empty salt, SHA-512, with empty info with missing deriveKey usage",0,null,null],["Derived key of type name: HMAC hash: SHA-1 length: 256 using short derivedKey, empty salt, SHA-512, with empty info with wrong (ECDH) key",0,null,null],["Derived key of type name: HMAC hash: SHA-256 length: 256 using short derivedKey, empty salt, SHA-512, with empty info",0,null,null],["Derived key of type name: HMAC hash: SHA-256 length: 256 using short derivedKey, empty salt, SHA-512, with empty info with bad hash name SHA512",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: HMAC hash: SHA-256 length: 256 using short derivedKey, empty salt, SHA-512, with empty info with missing deriveKey usage",0,null,null],["Derived key of type name: HMAC hash: SHA-256 length: 256 using short derivedKey, empty salt, SHA-512, with empty info with wrong (ECDH) key",0,null,null],["Derived key of type name: HMAC hash: SHA-384 length: 256 using short derivedKey, empty salt, SHA-512, with empty info",0,null,null],["Derived key of type name: HMAC hash: SHA-384 length: 256 using short derivedKey, empty salt, SHA-512, with empty info with bad hash name SHA512",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: HMAC hash: SHA-384 length: 256 using short derivedKey, empty salt, SHA-512, with empty info with missing deriveKey usage",0,null,null],["Derived key of type name: HMAC hash: SHA-384 length: 256 using short derivedKey, empty salt, SHA-512, with empty info with wrong (ECDH) key",0,null,null],["Derived key of type name: HMAC hash: SHA-512 length: 256 using short derivedKey, empty salt, SHA-512, with empty info",0,null,null],["Derived key of type name: HMAC hash: SHA-512 length: 256 using short derivedKey, empty salt, SHA-512, with empty info with bad hash name SHA512",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: HMAC hash: SHA-512 length: 256 using short derivedKey, empty salt, SHA-512, with empty info with missing deriveKey usage",0,null,null],["Derived key of type name: HMAC hash: SHA-512 length: 256 using short derivedKey, empty salt, SHA-512, with empty info with wrong (ECDH) key",0,null,null],["short derivedKey, empty salt, SHA-512, with empty info with missing salt",1,"assert_equals: deriveBits missing salt correctly threw OperationError: An invalid or illegal string was specified expected \"TypeError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:128:33\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:124:36\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:123:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["short derivedKey, empty salt, SHA-512, with empty info with missing info",1,"assert_equals: deriveBits missing info correctly threw OperationError: An invalid or illegal string was specified expected \"TypeError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:138:33\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:134:36\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:133:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["short derivedKey, empty salt, SHA-512, with empty info with null length",1,"assert_equals: deriveBits with null length correctly threw OperationError: Data provided to an operation does not meet requirements expected \"TypeError\" but got \"DataError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:148:33\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:144:36\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:143:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["short derivedKey, empty salt, SHA-512, with empty info with non-multiple of 8 length",1,"assert_unreached: non-multiple of 8 length should have thrown an OperationError Reached unreachable code","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:156:33\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:154:36\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:153:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["short derivedKey, empty salt, SHA-512, with empty info with bad hash name SHA512",1,"assert_equals: deriveBits with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:170:33\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:166:36\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:164:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["short derivedKey, empty salt, SHA-512, with empty info with missing deriveBits usage",0,null,null],["short derivedKey, empty salt, SHA-512, with empty info with wrong (ECDH) key",0,null,null],["short derivedKey, empty salt, SHA-1, with normal info",0,null,null],["short derivedKey, empty salt, SHA-1, with normal info with 0 length",1,"assert_equals: deriveBits with 0 length correctly threw OperationError: Data provided to an operation does not meet requirements expected \"OperationError\" but got \"DataError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:54:33\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:50:36\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:49:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-CBC length: 128 using short derivedKey, empty salt, SHA-1, with normal info",0,null,null],["Derived key of type name: AES-CBC length: 128 using short derivedKey, empty salt, SHA-1, with normal info with bad hash name SHA1",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-CBC length: 128 using short derivedKey, empty salt, SHA-1, with normal info with missing deriveKey usage",0,null,null],["Derived key of type name: AES-CBC length: 128 using short derivedKey, empty salt, SHA-1, with normal info with wrong (ECDH) key",0,null,null],["Derived key of type name: AES-CBC length: 192 using short derivedKey, empty salt, SHA-1, with normal info",0,null,null],["Derived key of type name: AES-CBC length: 192 using short derivedKey, empty salt, SHA-1, with normal info with bad hash name SHA1",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-CBC length: 192 using short derivedKey, empty salt, SHA-1, with normal info with missing deriveKey usage",0,null,null],["Derived key of type name: AES-CBC length: 192 using short derivedKey, empty salt, SHA-1, with normal info with wrong (ECDH) key",0,null,null],["Derived key of type name: AES-CBC length: 256 using short derivedKey, empty salt, SHA-1, with normal info",0,null,null],["Derived key of type name: AES-CBC length: 256 using short derivedKey, empty salt, SHA-1, with normal info with bad hash name SHA1",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-CBC length: 256 using short derivedKey, empty salt, SHA-1, with normal info with missing deriveKey usage",0,null,null],["Derived key of type name: AES-CBC length: 256 using short derivedKey, empty salt, SHA-1, with normal info with wrong (ECDH) key",0,null,null],["Derived key of type name: AES-CTR length: 128 using short derivedKey, empty salt, SHA-1, with normal info",0,null,null],["Derived key of type name: AES-CTR length: 128 using short derivedKey, empty salt, SHA-1, with normal info with bad hash name SHA1",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-CTR length: 128 using short derivedKey, empty salt, SHA-1, with normal info with missing deriveKey usage",0,null,null],["Derived key of type name: AES-CTR length: 128 using short derivedKey, empty salt, SHA-1, with normal info with wrong (ECDH) key",0,null,null],["Derived key of type name: AES-CTR length: 192 using short derivedKey, empty salt, SHA-1, with normal info",0,null,null],["Derived key of type name: AES-CTR length: 192 using short derivedKey, empty salt, SHA-1, with normal info with bad hash name SHA1",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-CTR length: 192 using short derivedKey, empty salt, SHA-1, with normal info with missing deriveKey usage",0,null,null],["Derived key of type name: AES-CTR length: 192 using short derivedKey, empty salt, SHA-1, with normal info with wrong (ECDH) key",0,null,null],["Derived key of type name: AES-CTR length: 256 using short derivedKey, empty salt, SHA-1, with normal info",0,null,null],["Derived key of type name: AES-CTR length: 256 using short derivedKey, empty salt, SHA-1, with normal info with bad hash name SHA1",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-CTR length: 256 using short derivedKey, empty salt, SHA-1, with normal info with missing deriveKey usage",0,null,null],["Derived key of type name: AES-CTR length: 256 using short derivedKey, empty salt, SHA-1, with normal info with wrong (ECDH) key",0,null,null],["Derived key of type name: AES-GCM length: 128 using short derivedKey, empty salt, SHA-1, with normal info",0,null,null],["Derived key of type name: AES-GCM length: 128 using short derivedKey, empty salt, SHA-1, with normal info with bad hash name SHA1",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-GCM length: 128 using short derivedKey, empty salt, SHA-1, with normal info with missing deriveKey usage",0,null,null],["Derived key of type name: AES-GCM length: 128 using short derivedKey, empty salt, SHA-1, with normal info with wrong (ECDH) key",0,null,null],["Derived key of type name: AES-GCM length: 192 using short derivedKey, empty salt, SHA-1, with normal info",0,null,null],["Derived key of type name: AES-GCM length: 192 using short derivedKey, empty salt, SHA-1, with normal info with bad hash name SHA1",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-GCM length: 192 using short derivedKey, empty salt, SHA-1, with normal info with missing deriveKey usage",0,null,null],["Derived key of type name: AES-GCM length: 192 using short derivedKey, empty salt, SHA-1, with normal info with wrong (ECDH) key",0,null,null],["Derived key of type name: AES-GCM length: 256 using short derivedKey, empty salt, SHA-1, with normal info",0,null,null],["Derived key of type name: AES-GCM length: 256 using short derivedKey, empty salt, SHA-1, with normal info with bad hash name SHA1",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-GCM length: 256 using short derivedKey, empty salt, SHA-1, with normal info with missing deriveKey usage",0,null,null],["Derived key of type name: AES-GCM length: 256 using short derivedKey, empty salt, SHA-1, with normal info with wrong (ECDH) key",0,null,null],["Derived key of type name: AES-KW length: 128 using short derivedKey, empty salt, SHA-1, with normal info",0,null,null],["Derived key of type name: AES-KW length: 128 using short derivedKey, empty salt, SHA-1, with normal info with bad hash name SHA1",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-KW length: 128 using short derivedKey, empty salt, SHA-1, with normal info with missing deriveKey usage",0,null,null],["Derived key of type name: AES-KW length: 128 using short derivedKey, empty salt, SHA-1, with normal info with wrong (ECDH) key",0,null,null],["Derived key of type name: AES-KW length: 192 using short derivedKey, empty salt, SHA-1, with normal info",0,null,null],["Derived key of type name: AES-KW length: 192 using short derivedKey, empty salt, SHA-1, with normal info with bad hash name SHA1",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-KW length: 192 using short derivedKey, empty salt, SHA-1, with normal info with missing deriveKey usage",0,null,null],["Derived key of type name: AES-KW length: 192 using short derivedKey, empty salt, SHA-1, with normal info with wrong (ECDH) key",0,null,null],["Derived key of type name: AES-KW length: 256 using short derivedKey, empty salt, SHA-1, with normal info",0,null,null],["Derived key of type name: AES-KW length: 256 using short derivedKey, empty salt, SHA-1, with normal info with bad hash name SHA1",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-KW length: 256 using short derivedKey, empty salt, SHA-1, with normal info with missing deriveKey usage",0,null,null],["Derived key of type name: AES-KW length: 256 using short derivedKey, empty salt, SHA-1, with normal info with wrong (ECDH) key",0,null,null],["Derived key of type name: HMAC hash: SHA-1 length: 256 using short derivedKey, empty salt, SHA-1, with normal info",0,null,null],["Derived key of type name: HMAC hash: SHA-1 length: 256 using short derivedKey, empty salt, SHA-1, with normal info with bad hash name SHA1",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: HMAC hash: SHA-1 length: 256 using short derivedKey, empty salt, SHA-1, with normal info with missing deriveKey usage",0,null,null],["Derived key of type name: HMAC hash: SHA-1 length: 256 using short derivedKey, empty salt, SHA-1, with normal info with wrong (ECDH) key",0,null,null],["Derived key of type name: HMAC hash: SHA-256 length: 256 using short derivedKey, empty salt, SHA-1, with normal info",0,null,null],["Derived key of type name: HMAC hash: SHA-256 length: 256 using short derivedKey, empty salt, SHA-1, with normal info with bad hash name SHA1",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: HMAC hash: SHA-256 length: 256 using short derivedKey, empty salt, SHA-1, with normal info with missing deriveKey usage",0,null,null],["Derived key of type name: HMAC hash: SHA-256 length: 256 using short derivedKey, empty salt, SHA-1, with normal info with wrong (ECDH) key",0,null,null],["Derived key of type name: HMAC hash: SHA-384 length: 256 using short derivedKey, empty salt, SHA-1, with normal info",0,null,null],["Derived key of type name: HMAC hash: SHA-384 length: 256 using short derivedKey, empty salt, SHA-1, with normal info with bad hash name SHA1",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: HMAC hash: SHA-384 length: 256 using short derivedKey, empty salt, SHA-1, with normal info with missing deriveKey usage",0,null,null],["Derived key of type name: HMAC hash: SHA-384 length: 256 using short derivedKey, empty salt, SHA-1, with normal info with wrong (ECDH) key",0,null,null],["Derived key of type name: HMAC hash: SHA-512 length: 256 using short derivedKey, empty salt, SHA-1, with normal info",0,null,null],["Derived key of type name: HMAC hash: SHA-512 length: 256 using short derivedKey, empty salt, SHA-1, with normal info with bad hash name SHA1",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: HMAC hash: SHA-512 length: 256 using short derivedKey, empty salt, SHA-1, with normal info with missing deriveKey usage",0,null,null],["Derived key of type name: HMAC hash: SHA-512 length: 256 using short derivedKey, empty salt, SHA-1, with normal info with wrong (ECDH) key",0,null,null],["short derivedKey, empty salt, SHA-1, with normal info with missing salt",1,"assert_equals: deriveBits missing salt correctly threw OperationError: An invalid or illegal string was specified expected \"TypeError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:128:33\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:124:36\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:123:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["short derivedKey, empty salt, SHA-1, with normal info with missing info",1,"assert_equals: deriveBits missing info correctly threw OperationError: An invalid or illegal string was specified expected \"TypeError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:138:33\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:134:36\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:133:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["short derivedKey, empty salt, SHA-1, with normal info with null length",1,"assert_equals: deriveBits with null length correctly threw OperationError: Data provided to an operation does not meet requirements expected \"TypeError\" but got \"DataError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:148:33\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:144:36\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:143:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["short derivedKey, empty salt, SHA-1, with normal info with non-multiple of 8 length",1,"assert_unreached: non-multiple of 8 length should have thrown an OperationError Reached unreachable code","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:156:33\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:154:36\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:153:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["short derivedKey, empty salt, SHA-1, with normal info with bad hash name SHA1",1,"assert_equals: deriveBits with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:170:33\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:166:36\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:164:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["short derivedKey, empty salt, SHA-1, with normal info with missing deriveBits usage",0,null,null],["short derivedKey, empty salt, SHA-1, with normal info with wrong (ECDH) key",0,null,null],["short derivedKey, empty salt, SHA-1, with empty info",0,null,null],["short derivedKey, empty salt, SHA-1, with empty info with 0 length",1,"assert_equals: deriveBits with 0 length correctly threw OperationError: Data provided to an operation does not meet requirements expected \"OperationError\" but got \"DataError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:54:33\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:50:36\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:49:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-CBC length: 128 using short derivedKey, empty salt, SHA-1, with empty info",0,null,null],["Derived key of type name: AES-CBC length: 128 using short derivedKey, empty salt, SHA-1, with empty info with bad hash name SHA1",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-CBC length: 128 using short derivedKey, empty salt, SHA-1, with empty info with missing deriveKey usage",0,null,null],["Derived key of type name: AES-CBC length: 128 using short derivedKey, empty salt, SHA-1, with empty info with wrong (ECDH) key",0,null,null],["Derived key of type name: AES-CBC length: 192 using short derivedKey, empty salt, SHA-1, with empty info",0,null,null],["Derived key of type name: AES-CBC length: 192 using short derivedKey, empty salt, SHA-1, with empty info with bad hash name SHA1",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-CBC length: 192 using short derivedKey, empty salt, SHA-1, with empty info with missing deriveKey usage",0,null,null],["Derived key of type name: AES-CBC length: 192 using short derivedKey, empty salt, SHA-1, with empty info with wrong (ECDH) key",0,null,null],["Derived key of type name: AES-CBC length: 256 using short derivedKey, empty salt, SHA-1, with empty info",0,null,null],["Derived key of type name: AES-CBC length: 256 using short derivedKey, empty salt, SHA-1, with empty info with bad hash name SHA1",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-CBC length: 256 using short derivedKey, empty salt, SHA-1, with empty info with missing deriveKey usage",0,null,null],["Derived key of type name: AES-CBC length: 256 using short derivedKey, empty salt, SHA-1, with empty info with wrong (ECDH) key",0,null,null],["Derived key of type name: AES-CTR length: 128 using short derivedKey, empty salt, SHA-1, with empty info",0,null,null],["Derived key of type name: AES-CTR length: 128 using short derivedKey, empty salt, SHA-1, with empty info with bad hash name SHA1",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-CTR length: 128 using short derivedKey, empty salt, SHA-1, with empty info with missing deriveKey usage",0,null,null],["Derived key of type name: AES-CTR length: 128 using short derivedKey, empty salt, SHA-1, with empty info with wrong (ECDH) key",0,null,null],["Derived key of type name: AES-CTR length: 192 using short derivedKey, empty salt, SHA-1, with empty info",0,null,null],["Derived key of type name: AES-CTR length: 192 using short derivedKey, empty salt, SHA-1, with empty info with bad hash name SHA1",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-CTR length: 192 using short derivedKey, empty salt, SHA-1, with empty info with missing deriveKey usage",0,null,null],["Derived key of type name: AES-CTR length: 192 using short derivedKey, empty salt, SHA-1, with empty info with wrong (ECDH) key",0,null,null],["Derived key of type name: AES-CTR length: 256 using short derivedKey, empty salt, SHA-1, with empty info",0,null,null],["Derived key of type name: AES-CTR length: 256 using short derivedKey, empty salt, SHA-1, with empty info with bad hash name SHA1",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-CTR length: 256 using short derivedKey, empty salt, SHA-1, with empty info with missing deriveKey usage",0,null,null],["Derived key of type name: AES-CTR length: 256 using short derivedKey, empty salt, SHA-1, with empty info with wrong (ECDH) key",0,null,null],["Derived key of type name: AES-GCM length: 128 using short derivedKey, empty salt, SHA-1, with empty info",0,null,null],["Derived key of type name: AES-GCM length: 128 using short derivedKey, empty salt, SHA-1, with empty info with bad hash name SHA1",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-GCM length: 128 using short derivedKey, empty salt, SHA-1, with empty info with missing deriveKey usage",0,null,null],["Derived key of type name: AES-GCM length: 128 using short derivedKey, empty salt, SHA-1, with empty info with wrong (ECDH) key",0,null,null],["Derived key of type name: AES-GCM length: 192 using short derivedKey, empty salt, SHA-1, with empty info",0,null,null],["Derived key of type name: AES-GCM length: 192 using short derivedKey, empty salt, SHA-1, with empty info with bad hash name SHA1",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-GCM length: 192 using short derivedKey, empty salt, SHA-1, with empty info with missing deriveKey usage",0,null,null],["Derived key of type name: AES-GCM length: 192 using short derivedKey, empty salt, SHA-1, with empty info with wrong (ECDH) key",0,null,null],["Derived key of type name: AES-GCM length: 256 using short derivedKey, empty salt, SHA-1, with empty info",0,null,null],["Derived key of type name: AES-GCM length: 256 using short derivedKey, empty salt, SHA-1, with empty info with bad hash name SHA1",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-GCM length: 256 using short derivedKey, empty salt, SHA-1, with empty info with missing deriveKey usage",0,null,null],["Derived key of type name: AES-GCM length: 256 using short derivedKey, empty salt, SHA-1, with empty info with wrong (ECDH) key",0,null,null],["Derived key of type name: AES-KW length: 128 using short derivedKey, empty salt, SHA-1, with empty info",0,null,null],["Derived key of type name: AES-KW length: 128 using short derivedKey, empty salt, SHA-1, with empty info with bad hash name SHA1",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-KW length: 128 using short derivedKey, empty salt, SHA-1, with empty info with missing deriveKey usage",0,null,null],["Derived key of type name: AES-KW length: 128 using short derivedKey, empty salt, SHA-1, with empty info with wrong (ECDH) key",0,null,null],["Derived key of type name: AES-KW length: 192 using short derivedKey, empty salt, SHA-1, with empty info",0,null,null],["Derived key of type name: AES-KW length: 192 using short derivedKey, empty salt, SHA-1, with empty info with bad hash name SHA1",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-KW length: 192 using short derivedKey, empty salt, SHA-1, with empty info with missing deriveKey usage",0,null,null],["Derived key of type name: AES-KW length: 192 using short derivedKey, empty salt, SHA-1, with empty info with wrong (ECDH) key",0,null,null],["Derived key of type name: AES-KW length: 256 using short derivedKey, empty salt, SHA-1, with empty info",0,null,null],["Derived key of type name: AES-KW length: 256 using short derivedKey, empty salt, SHA-1, with empty info with bad hash name SHA1",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-KW length: 256 using short derivedKey, empty salt, SHA-1, with empty info with missing deriveKey usage",0,null,null],["Derived key of type name: AES-KW length: 256 using short derivedKey, empty salt, SHA-1, with empty info with wrong (ECDH) key",0,null,null],["Derived key of type name: HMAC hash: SHA-1 length: 256 using short derivedKey, empty salt, SHA-1, with empty info",0,null,null],["Derived key of type name: HMAC hash: SHA-1 length: 256 using short derivedKey, empty salt, SHA-1, with empty info with bad hash name SHA1",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: HMAC hash: SHA-1 length: 256 using short derivedKey, empty salt, SHA-1, with empty info with missing deriveKey usage",0,null,null],["Derived key of type name: HMAC hash: SHA-1 length: 256 using short derivedKey, empty salt, SHA-1, with empty info with wrong (ECDH) key",0,null,null],["Derived key of type name: HMAC hash: SHA-256 length: 256 using short derivedKey, empty salt, SHA-1, with empty info",0,null,null],["Derived key of type name: HMAC hash: SHA-256 length: 256 using short derivedKey, empty salt, SHA-1, with empty info with bad hash name SHA1",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: HMAC hash: SHA-256 length: 256 using short derivedKey, empty salt, SHA-1, with empty info with missing deriveKey usage",0,null,null],["Derived key of type name: HMAC hash: SHA-256 length: 256 using short derivedKey, empty salt, SHA-1, with empty info with wrong (ECDH) key",0,null,null],["Derived key of type name: HMAC hash: SHA-384 length: 256 using short derivedKey, empty salt, SHA-1, with empty info",0,null,null],["Derived key of type name: HMAC hash: SHA-384 length: 256 using short derivedKey, empty salt, SHA-1, with empty info with bad hash name SHA1",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: HMAC hash: SHA-384 length: 256 using short derivedKey, empty salt, SHA-1, with empty info with missing deriveKey usage",0,null,null],["Derived key of type name: HMAC hash: SHA-384 length: 256 using short derivedKey, empty salt, SHA-1, with empty info with wrong (ECDH) key",0,null,null],["Derived key of type name: HMAC hash: SHA-512 length: 256 using short derivedKey, empty salt, SHA-1, with empty info",0,null,null],["Derived key of type name: HMAC hash: SHA-512 length: 256 using short derivedKey, empty salt, SHA-1, with empty info with bad hash name SHA1",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: HMAC hash: SHA-512 length: 256 using short derivedKey, empty salt, SHA-1, with empty info with missing deriveKey usage",0,null,null],["Derived key of type name: HMAC hash: SHA-512 length: 256 using short derivedKey, empty salt, SHA-1, with empty info with wrong (ECDH) key",0,null,null],["short derivedKey, empty salt, SHA-1, with empty info with missing salt",1,"assert_equals: deriveBits missing salt correctly threw OperationError: An invalid or illegal string was specified expected \"TypeError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:128:33\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:124:36\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:123:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["short derivedKey, empty salt, SHA-1, with empty info with missing info",1,"assert_equals: deriveBits missing info correctly threw OperationError: An invalid or illegal string was specified expected \"TypeError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:138:33\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:134:36\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:133:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["short derivedKey, empty salt, SHA-1, with empty info with null length",1,"assert_equals: deriveBits with null length correctly threw OperationError: Data provided to an operation does not meet requirements expected \"TypeError\" but got \"DataError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:148:33\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:144:36\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:143:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["short derivedKey, empty salt, SHA-1, with empty info with non-multiple of 8 length",1,"assert_unreached: non-multiple of 8 length should have thrown an OperationError Reached unreachable code","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:156:33\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:154:36\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:153:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["short derivedKey, empty salt, SHA-1, with empty info with bad hash name SHA1",1,"assert_equals: deriveBits with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:170:33\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:166:36\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:164:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["short derivedKey, empty salt, SHA-1, with empty info with missing deriveBits usage",0,null,null],["short derivedKey, empty salt, SHA-1, with empty info with wrong (ECDH) key",0,null,null],["short derivedKey, empty salt, SHA-256, with normal info",0,null,null],["short derivedKey, empty salt, SHA-256, with normal info with 0 length",1,"assert_equals: deriveBits with 0 length correctly threw OperationError: Data provided to an operation does not meet requirements expected \"OperationError\" but got \"DataError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:54:33\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:50:36\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:49:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-CBC length: 128 using short derivedKey, empty salt, SHA-256, with normal info",0,null,null],["Derived key of type name: AES-CBC length: 128 using short derivedKey, empty salt, SHA-256, with normal info with bad hash name SHA256",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-CBC length: 128 using short derivedKey, empty salt, SHA-256, with normal info with missing deriveKey usage",0,null,null],["Derived key of type name: AES-CBC length: 128 using short derivedKey, empty salt, SHA-256, with normal info with wrong (ECDH) key",0,null,null],["Derived key of type name: AES-CBC length: 192 using short derivedKey, empty salt, SHA-256, with normal info",0,null,null],["Derived key of type name: AES-CBC length: 192 using short derivedKey, empty salt, SHA-256, with normal info with bad hash name SHA256",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-CBC length: 192 using short derivedKey, empty salt, SHA-256, with normal info with missing deriveKey usage",0,null,null],["Derived key of type name: AES-CBC length: 192 using short derivedKey, empty salt, SHA-256, with normal info with wrong (ECDH) key",0,null,null],["Derived key of type name: AES-CBC length: 256 using short derivedKey, empty salt, SHA-256, with normal info",0,null,null],["Derived key of type name: AES-CBC length: 256 using short derivedKey, empty salt, SHA-256, with normal info with bad hash name SHA256",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-CBC length: 256 using short derivedKey, empty salt, SHA-256, with normal info with missing deriveKey usage",0,null,null],["Derived key of type name: AES-CBC length: 256 using short derivedKey, empty salt, SHA-256, with normal info with wrong (ECDH) key",0,null,null],["Derived key of type name: AES-CTR length: 128 using short derivedKey, empty salt, SHA-256, with normal info",0,null,null],["Derived key of type name: AES-CTR length: 128 using short derivedKey, empty salt, SHA-256, with normal info with bad hash name SHA256",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-CTR length: 128 using short derivedKey, empty salt, SHA-256, with normal info with missing deriveKey usage",0,null,null],["Derived key of type name: AES-CTR length: 128 using short derivedKey, empty salt, SHA-256, with normal info with wrong (ECDH) key",0,null,null],["Derived key of type name: AES-CTR length: 192 using short derivedKey, empty salt, SHA-256, with normal info",0,null,null],["Derived key of type name: AES-CTR length: 192 using short derivedKey, empty salt, SHA-256, with normal info with bad hash name SHA256",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-CTR length: 192 using short derivedKey, empty salt, SHA-256, with normal info with missing deriveKey usage",0,null,null],["Derived key of type name: AES-CTR length: 192 using short derivedKey, empty salt, SHA-256, with normal info with wrong (ECDH) key",0,null,null],["Derived key of type name: AES-CTR length: 256 using short derivedKey, empty salt, SHA-256, with normal info",0,null,null],["Derived key of type name: AES-CTR length: 256 using short derivedKey, empty salt, SHA-256, with normal info with bad hash name SHA256",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-CTR length: 256 using short derivedKey, empty salt, SHA-256, with normal info with missing deriveKey usage",0,null,null],["Derived key of type name: AES-CTR length: 256 using short derivedKey, empty salt, SHA-256, with normal info with wrong (ECDH) key",0,null,null],["Derived key of type name: AES-GCM length: 128 using short derivedKey, empty salt, SHA-256, with normal info",0,null,null],["Derived key of type name: AES-GCM length: 128 using short derivedKey, empty salt, SHA-256, with normal info with bad hash name SHA256",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-GCM length: 128 using short derivedKey, empty salt, SHA-256, with normal info with missing deriveKey usage",0,null,null],["Derived key of type name: AES-GCM length: 128 using short derivedKey, empty salt, SHA-256, with normal info with wrong (ECDH) key",0,null,null],["Derived key of type name: AES-GCM length: 192 using short derivedKey, empty salt, SHA-256, with normal info",0,null,null],["Derived key of type name: AES-GCM length: 192 using short derivedKey, empty salt, SHA-256, with normal info with bad hash name SHA256",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-GCM length: 192 using short derivedKey, empty salt, SHA-256, with normal info with missing deriveKey usage",0,null,null],["Derived key of type name: AES-GCM length: 192 using short derivedKey, empty salt, SHA-256, with normal info with wrong (ECDH) key",0,null,null],["Derived key of type name: AES-GCM length: 256 using short derivedKey, empty salt, SHA-256, with normal info",0,null,null],["Derived key of type name: AES-GCM length: 256 using short derivedKey, empty salt, SHA-256, with normal info with bad hash name SHA256",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-GCM length: 256 using short derivedKey, empty salt, SHA-256, with normal info with missing deriveKey usage",0,null,null],["Derived key of type name: AES-GCM length: 256 using short derivedKey, empty salt, SHA-256, with normal info with wrong (ECDH) key",0,null,null],["Derived key of type name: AES-KW length: 128 using short derivedKey, empty salt, SHA-256, with normal info",0,null,null],["Derived key of type name: AES-KW length: 128 using short derivedKey, empty salt, SHA-256, with normal info with bad hash name SHA256",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-KW length: 128 using short derivedKey, empty salt, SHA-256, with normal info with missing deriveKey usage",0,null,null],["Derived key of type name: AES-KW length: 128 using short derivedKey, empty salt, SHA-256, with normal info with wrong (ECDH) key",0,null,null],["Derived key of type name: AES-KW length: 192 using short derivedKey, empty salt, SHA-256, with normal info",0,null,null],["Derived key of type name: AES-KW length: 192 using short derivedKey, empty salt, SHA-256, with normal info with bad hash name SHA256",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-KW length: 192 using short derivedKey, empty salt, SHA-256, with normal info with missing deriveKey usage",0,null,null],["Derived key of type name: AES-KW length: 192 using short derivedKey, empty salt, SHA-256, with normal info with wrong (ECDH) key",0,null,null],["Derived key of type name: AES-KW length: 256 using short derivedKey, empty salt, SHA-256, with normal info",0,null,null],["Derived key of type name: AES-KW length: 256 using short derivedKey, empty salt, SHA-256, with normal info with bad hash name SHA256",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-KW length: 256 using short derivedKey, empty salt, SHA-256, with normal info with missing deriveKey usage",0,null,null],["Derived key of type name: AES-KW length: 256 using short derivedKey, empty salt, SHA-256, with normal info with wrong (ECDH) key",0,null,null],["Derived key of type name: HMAC hash: SHA-1 length: 256 using short derivedKey, empty salt, SHA-256, with normal info",0,null,null],["Derived key of type name: HMAC hash: SHA-1 length: 256 using short derivedKey, empty salt, SHA-256, with normal info with bad hash name SHA256",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: HMAC hash: SHA-1 length: 256 using short derivedKey, empty salt, SHA-256, with normal info with missing deriveKey usage",0,null,null],["Derived key of type name: HMAC hash: SHA-1 length: 256 using short derivedKey, empty salt, SHA-256, with normal info with wrong (ECDH) key",0,null,null],["Derived key of type name: HMAC hash: SHA-256 length: 256 using short derivedKey, empty salt, SHA-256, with normal info",0,null,null],["Derived key of type name: HMAC hash: SHA-256 length: 256 using short derivedKey, empty salt, SHA-256, with normal info with bad hash name SHA256",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: HMAC hash: SHA-256 length: 256 using short derivedKey, empty salt, SHA-256, with normal info with missing deriveKey usage",0,null,null],["Derived key of type name: HMAC hash: SHA-256 length: 256 using short derivedKey, empty salt, SHA-256, with normal info with wrong (ECDH) key",0,null,null],["Derived key of type name: HMAC hash: SHA-384 length: 256 using short derivedKey, empty salt, SHA-256, with normal info",0,null,null],["Derived key of type name: HMAC hash: SHA-384 length: 256 using short derivedKey, empty salt, SHA-256, with normal info with bad hash name SHA256",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: HMAC hash: SHA-384 length: 256 using short derivedKey, empty salt, SHA-256, with normal info with missing deriveKey usage",0,null,null],["Derived key of type name: HMAC hash: SHA-384 length: 256 using short derivedKey, empty salt, SHA-256, with normal info with wrong (ECDH) key",0,null,null],["Derived key of type name: HMAC hash: SHA-512 length: 256 using short derivedKey, empty salt, SHA-256, with normal info",0,null,null],["Derived key of type name: HMAC hash: SHA-512 length: 256 using short derivedKey, empty salt, SHA-256, with normal info with bad hash name SHA256",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: HMAC hash: SHA-512 length: 256 using short derivedKey, empty salt, SHA-256, with normal info with missing deriveKey usage",0,null,null],["Derived key of type name: HMAC hash: SHA-512 length: 256 using short derivedKey, empty salt, SHA-256, with normal info with wrong (ECDH) key",0,null,null],["short derivedKey, empty salt, SHA-256, with normal info with missing salt",1,"assert_equals: deriveBits missing salt correctly threw OperationError: An invalid or illegal string was specified expected \"TypeError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:128:33\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:124:36\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:123:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["short derivedKey, empty salt, SHA-256, with normal info with missing info",1,"assert_equals: deriveBits missing info correctly threw OperationError: An invalid or illegal string was specified expected \"TypeError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:138:33\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:134:36\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:133:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["short derivedKey, empty salt, SHA-256, with normal info with null length",1,"assert_equals: deriveBits with null length correctly threw OperationError: Data provided to an operation does not meet requirements expected \"TypeError\" but got \"DataError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:148:33\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:144:36\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:143:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["short derivedKey, empty salt, SHA-256, with normal info with non-multiple of 8 length",1,"assert_unreached: non-multiple of 8 length should have thrown an OperationError Reached unreachable code","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:156:33\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:154:36\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:153:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["short derivedKey, empty salt, SHA-256, with normal info with bad hash name SHA256",1,"assert_equals: deriveBits with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:170:33\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:166:36\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:164:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["short derivedKey, empty salt, SHA-256, with normal info with missing deriveBits usage",0,null,null],["short derivedKey, empty salt, SHA-256, with normal info with wrong (ECDH) key",0,null,null],["short derivedKey, empty salt, SHA-256, with empty info",0,null,null],["short derivedKey, empty salt, SHA-256, with empty info with 0 length",1,"assert_equals: deriveBits with 0 length correctly threw OperationError: Data provided to an operation does not meet requirements expected \"OperationError\" but got \"DataError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:54:33\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:50:36\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:49:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-CBC length: 128 using short derivedKey, empty salt, SHA-256, with empty info",0,null,null],["Derived key of type name: AES-CBC length: 128 using short derivedKey, empty salt, SHA-256, with empty info with bad hash name SHA256",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-CBC length: 128 using short derivedKey, empty salt, SHA-256, with empty info with missing deriveKey usage",0,null,null],["Derived key of type name: AES-CBC length: 128 using short derivedKey, empty salt, SHA-256, with empty info with wrong (ECDH) key",0,null,null],["Derived key of type name: AES-CBC length: 192 using short derivedKey, empty salt, SHA-256, with empty info",0,null,null],["Derived key of type name: AES-CBC length: 192 using short derivedKey, empty salt, SHA-256, with empty info with bad hash name SHA256",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-CBC length: 192 using short derivedKey, empty salt, SHA-256, with empty info with missing deriveKey usage",0,null,null],["Derived key of type name: AES-CBC length: 192 using short derivedKey, empty salt, SHA-256, with empty info with wrong (ECDH) key",0,null,null],["Derived key of type name: AES-CBC length: 256 using short derivedKey, empty salt, SHA-256, with empty info",0,null,null],["Derived key of type name: AES-CBC length: 256 using short derivedKey, empty salt, SHA-256, with empty info with bad hash name SHA256",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-CBC length: 256 using short derivedKey, empty salt, SHA-256, with empty info with missing deriveKey usage",0,null,null],["Derived key of type name: AES-CBC length: 256 using short derivedKey, empty salt, SHA-256, with empty info with wrong (ECDH) key",0,null,null],["Derived key of type name: AES-CTR length: 128 using short derivedKey, empty salt, SHA-256, with empty info",0,null,null],["Derived key of type name: AES-CTR length: 128 using short derivedKey, empty salt, SHA-256, with empty info with bad hash name SHA256",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-CTR length: 128 using short derivedKey, empty salt, SHA-256, with empty info with missing deriveKey usage",0,null,null],["Derived key of type name: AES-CTR length: 128 using short derivedKey, empty salt, SHA-256, with empty info with wrong (ECDH) key",0,null,null],["Derived key of type name: AES-CTR length: 192 using short derivedKey, empty salt, SHA-256, with empty info",0,null,null],["Derived key of type name: AES-CTR length: 192 using short derivedKey, empty salt, SHA-256, with empty info with bad hash name SHA256",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-CTR length: 192 using short derivedKey, empty salt, SHA-256, with empty info with missing deriveKey usage",0,null,null],["Derived key of type name: AES-CTR length: 192 using short derivedKey, empty salt, SHA-256, with empty info with wrong (ECDH) key",0,null,null],["Derived key of type name: AES-CTR length: 256 using short derivedKey, empty salt, SHA-256, with empty info",0,null,null],["Derived key of type name: AES-CTR length: 256 using short derivedKey, empty salt, SHA-256, with empty info with bad hash name SHA256",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-CTR length: 256 using short derivedKey, empty salt, SHA-256, with empty info with missing deriveKey usage",0,null,null],["Derived key of type name: AES-CTR length: 256 using short derivedKey, empty salt, SHA-256, with empty info with wrong (ECDH) key",0,null,null],["Derived key of type name: AES-GCM length: 128 using short derivedKey, empty salt, SHA-256, with empty info",0,null,null],["Derived key of type name: AES-GCM length: 128 using short derivedKey, empty salt, SHA-256, with empty info with bad hash name SHA256",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-GCM length: 128 using short derivedKey, empty salt, SHA-256, with empty info with missing deriveKey usage",0,null,null],["Derived key of type name: AES-GCM length: 128 using short derivedKey, empty salt, SHA-256, with empty info with wrong (ECDH) key",0,null,null],["Derived key of type name: AES-GCM length: 192 using short derivedKey, empty salt, SHA-256, with empty info",0,null,null],["Derived key of type name: AES-GCM length: 192 using short derivedKey, empty salt, SHA-256, with empty info with bad hash name SHA256",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-GCM length: 192 using short derivedKey, empty salt, SHA-256, with empty info with missing deriveKey usage",0,null,null],["Derived key of type name: AES-GCM length: 192 using short derivedKey, empty salt, SHA-256, with empty info with wrong (ECDH) key",0,null,null],["Derived key of type name: AES-GCM length: 256 using short derivedKey, empty salt, SHA-256, with empty info",0,null,null],["Derived key of type name: AES-GCM length: 256 using short derivedKey, empty salt, SHA-256, with empty info with bad hash name SHA256",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-GCM length: 256 using short derivedKey, empty salt, SHA-256, with empty info with missing deriveKey usage",0,null,null],["Derived key of type name: AES-GCM length: 256 using short derivedKey, empty salt, SHA-256, with empty info with wrong (ECDH) key",0,null,null],["Derived key of type name: AES-KW length: 128 using short derivedKey, empty salt, SHA-256, with empty info",0,null,null],["Derived key of type name: AES-KW length: 128 using short derivedKey, empty salt, SHA-256, with empty info with bad hash name SHA256",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-KW length: 128 using short derivedKey, empty salt, SHA-256, with empty info with missing deriveKey usage",0,null,null],["Derived key of type name: AES-KW length: 128 using short derivedKey, empty salt, SHA-256, with empty info with wrong (ECDH) key",0,null,null],["Derived key of type name: AES-KW length: 192 using short derivedKey, empty salt, SHA-256, with empty info",0,null,null],["Derived key of type name: AES-KW length: 192 using short derivedKey, empty salt, SHA-256, with empty info with bad hash name SHA256",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-KW length: 192 using short derivedKey, empty salt, SHA-256, with empty info with missing deriveKey usage",0,null,null],["Derived key of type name: AES-KW length: 192 using short derivedKey, empty salt, SHA-256, with empty info with wrong (ECDH) key",0,null,null],["Derived key of type name: AES-KW length: 256 using short derivedKey, empty salt, SHA-256, with empty info",0,null,null],["Derived key of type name: AES-KW length: 256 using short derivedKey, empty salt, SHA-256, with empty info with bad hash name SHA256",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-KW length: 256 using short derivedKey, empty salt, SHA-256, with empty info with missing deriveKey usage",0,null,null],["Derived key of type name: AES-KW length: 256 using short derivedKey, empty salt, SHA-256, with empty info with wrong (ECDH) key",0,null,null],["Derived key of type name: HMAC hash: SHA-1 length: 256 using short derivedKey, empty salt, SHA-256, with empty info",0,null,null],["Derived key of type name: HMAC hash: SHA-1 length: 256 using short derivedKey, empty salt, SHA-256, with empty info with bad hash name SHA256",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: HMAC hash: SHA-1 length: 256 using short derivedKey, empty salt, SHA-256, with empty info with missing deriveKey usage",0,null,null],["Derived key of type name: HMAC hash: SHA-1 length: 256 using short derivedKey, empty salt, SHA-256, with empty info with wrong (ECDH) key",0,null,null],["Derived key of type name: HMAC hash: SHA-256 length: 256 using short derivedKey, empty salt, SHA-256, with empty info",0,null,null],["Derived key of type name: HMAC hash: SHA-256 length: 256 using short derivedKey, empty salt, SHA-256, with empty info with bad hash name SHA256",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: HMAC hash: SHA-256 length: 256 using short derivedKey, empty salt, SHA-256, with empty info with missing deriveKey usage",0,null,null],["Derived key of type name: HMAC hash: SHA-256 length: 256 using short derivedKey, empty salt, SHA-256, with empty info with wrong (ECDH) key",0,null,null],["Derived key of type name: HMAC hash: SHA-384 length: 256 using short derivedKey, empty salt, SHA-256, with empty info",0,null,null],["Derived key of type name: HMAC hash: SHA-384 length: 256 using short derivedKey, empty salt, SHA-256, with empty info with bad hash name SHA256",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: HMAC hash: SHA-384 length: 256 using short derivedKey, empty salt, SHA-256, with empty info with missing deriveKey usage",0,null,null],["Derived key of type name: HMAC hash: SHA-384 length: 256 using short derivedKey, empty salt, SHA-256, with empty info with wrong (ECDH) key",0,null,null],["Derived key of type name: HMAC hash: SHA-512 length: 256 using short derivedKey, empty salt, SHA-256, with empty info",0,null,null],["Derived key of type name: HMAC hash: SHA-512 length: 256 using short derivedKey, empty salt, SHA-256, with empty info with bad hash name SHA256",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: HMAC hash: SHA-512 length: 256 using short derivedKey, empty salt, SHA-256, with empty info with missing deriveKey usage",0,null,null],["Derived key of type name: HMAC hash: SHA-512 length: 256 using short derivedKey, empty salt, SHA-256, with empty info with wrong (ECDH) key",0,null,null],["short derivedKey, empty salt, SHA-256, with empty info with missing salt",1,"assert_equals: deriveBits missing salt correctly threw OperationError: An invalid or illegal string was specified expected \"TypeError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:128:33\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:124:36\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:123:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["short derivedKey, empty salt, SHA-256, with empty info with missing info",1,"assert_equals: deriveBits missing info correctly threw OperationError: An invalid or illegal string was specified expected \"TypeError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:138:33\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:134:36\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:133:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["short derivedKey, empty salt, SHA-256, with empty info with null length",1,"assert_equals: deriveBits with null length correctly threw OperationError: Data provided to an operation does not meet requirements expected \"TypeError\" but got \"DataError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:148:33\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:144:36\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:143:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["short derivedKey, empty salt, SHA-256, with empty info with non-multiple of 8 length",1,"assert_unreached: non-multiple of 8 length should have thrown an OperationError Reached unreachable code","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:156:33\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:154:36\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:153:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["short derivedKey, empty salt, SHA-256, with empty info with bad hash name SHA256",1,"assert_equals: deriveBits with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:170:33\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:166:36\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:164:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["short derivedKey, empty salt, SHA-256, with empty info with missing deriveBits usage",0,null,null],["short derivedKey, empty salt, SHA-256, with empty info with wrong (ECDH) key",0,null,null],["short derivedKey, empty salt, PBKDF2, with normal info with non-digest algorithm PBKDF2",0,null,null],["Derived key of type name: AES-CBC length: 128 using short derivedKey, empty salt, PBKDF2, with normal info",0,null,null],["Derived key of type name: AES-CBC length: 192 using short derivedKey, empty salt, PBKDF2, with normal info",0,null,null],["Derived key of type name: AES-CBC length: 256 using short derivedKey, empty salt, PBKDF2, with normal info",0,null,null],["Derived key of type name: AES-CTR length: 128 using short derivedKey, empty salt, PBKDF2, with normal info",0,null,null],["Derived key of type name: AES-CTR length: 192 using short derivedKey, empty salt, PBKDF2, with normal info",0,null,null],["Derived key of type name: AES-CTR length: 256 using short derivedKey, empty salt, PBKDF2, with normal info",0,null,null],["Derived key of type name: AES-GCM length: 128 using short derivedKey, empty salt, PBKDF2, with normal info",0,null,null],["Derived key of type name: AES-GCM length: 192 using short derivedKey, empty salt, PBKDF2, with normal info",0,null,null],["Derived key of type name: AES-GCM length: 256 using short derivedKey, empty salt, PBKDF2, with normal info",0,null,null],["Derived key of type name: AES-KW length: 128 using short derivedKey, empty salt, PBKDF2, with normal info",0,null,null],["Derived key of type name: AES-KW length: 192 using short derivedKey, empty salt, PBKDF2, with normal info",0,null,null],["Derived key of type name: AES-KW length: 256 using short derivedKey, empty salt, PBKDF2, with normal info",0,null,null],["Derived key of type name: HMAC hash: SHA-1 length: 256 using short derivedKey, empty salt, PBKDF2, with normal info",0,null,null],["Derived key of type name: HMAC hash: SHA-256 length: 256 using short derivedKey, empty salt, PBKDF2, with normal info",0,null,null],["Derived key of type name: HMAC hash: SHA-384 length: 256 using short derivedKey, empty salt, PBKDF2, with normal info",0,null,null],["Derived key of type name: HMAC hash: SHA-512 length: 256 using short derivedKey, empty salt, PBKDF2, with normal info",0,null,null],["short derivedKey, empty salt, PBKDF2, with empty info with non-digest algorithm PBKDF2",0,null,null],["Derived key of type name: AES-CBC length: 128 using short derivedKey, empty salt, PBKDF2, with empty info",0,null,null],["Derived key of type name: AES-CBC length: 192 using short derivedKey, empty salt, PBKDF2, with empty info",0,null,null],["Derived key of type name: AES-CBC length: 256 using short derivedKey, empty salt, PBKDF2, with empty info",0,null,null],["Derived key of type name: AES-CTR length: 128 using short derivedKey, empty salt, PBKDF2, with empty info",0,null,null],["Derived key of type name: AES-CTR length: 192 using short derivedKey, empty salt, PBKDF2, with empty info",0,null,null],["Derived key of type name: AES-CTR length: 256 using short derivedKey, empty salt, PBKDF2, with empty info",0,null,null],["Derived key of type name: AES-GCM length: 128 using short derivedKey, empty salt, PBKDF2, with empty info",0,null,null],["Derived key of type name: AES-GCM length: 192 using short derivedKey, empty salt, PBKDF2, with empty info",0,null,null],["Derived key of type name: AES-GCM length: 256 using short derivedKey, empty salt, PBKDF2, with empty info",0,null,null],["Derived key of type name: AES-KW length: 128 using short derivedKey, empty salt, PBKDF2, with empty info",0,null,null],["Derived key of type name: AES-KW length: 192 using short derivedKey, empty salt, PBKDF2, with empty info",0,null,null],["Derived key of type name: AES-KW length: 256 using short derivedKey, empty salt, PBKDF2, with empty info",0,null,null],["Derived key of type name: HMAC hash: SHA-1 length: 256 using short derivedKey, empty salt, PBKDF2, with empty info",0,null,null],["Derived key of type name: HMAC hash: SHA-256 length: 256 using short derivedKey, empty salt, PBKDF2, with empty info",0,null,null],["Derived key of type name: HMAC hash: SHA-384 length: 256 using short derivedKey, empty salt, PBKDF2, with empty info",0,null,null],["Derived key of type name: HMAC hash: SHA-512 length: 256 using short derivedKey, empty salt, PBKDF2, with empty info",0,null,null],["long derivedKey, normal salt, SHA-384, with normal info",0,null,null],["long derivedKey, normal salt, SHA-384, with normal info with 0 length",1,"assert_equals: deriveBits with 0 length correctly threw OperationError: Data provided to an operation does not meet requirements expected \"OperationError\" but got \"DataError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:54:33\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:50:36\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:49:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-CBC length: 128 using long derivedKey, normal salt, SHA-384, with normal info",0,null,null],["Derived key of type name: AES-CBC length: 128 using long derivedKey, normal salt, SHA-384, with normal info with bad hash name SHA384",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-CBC length: 128 using long derivedKey, normal salt, SHA-384, with normal info with missing deriveKey usage",0,null,null],["Derived key of type name: AES-CBC length: 128 using long derivedKey, normal salt, SHA-384, with normal info with wrong (ECDH) key",0,null,null],["Derived key of type name: AES-CBC length: 192 using long derivedKey, normal salt, SHA-384, with normal info",0,null,null],["Derived key of type name: AES-CBC length: 192 using long derivedKey, normal salt, SHA-384, with normal info with bad hash name SHA384",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-CBC length: 192 using long derivedKey, normal salt, SHA-384, with normal info with missing deriveKey usage",0,null,null],["Derived key of type name: AES-CBC length: 192 using long derivedKey, normal salt, SHA-384, with normal info with wrong (ECDH) key",0,null,null],["Derived key of type name: AES-CBC length: 256 using long derivedKey, normal salt, SHA-384, with normal info",0,null,null],["Derived key of type name: AES-CBC length: 256 using long derivedKey, normal salt, SHA-384, with normal info with bad hash name SHA384",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-CBC length: 256 using long derivedKey, normal salt, SHA-384, with normal info with missing deriveKey usage",0,null,null],["Derived key of type name: AES-CBC length: 256 using long derivedKey, normal salt, SHA-384, with normal info with wrong (ECDH) key",0,null,null],["Derived key of type name: AES-CTR length: 128 using long derivedKey, normal salt, SHA-384, with normal info",0,null,null],["Derived key of type name: AES-CTR length: 128 using long derivedKey, normal salt, SHA-384, with normal info with bad hash name SHA384",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-CTR length: 128 using long derivedKey, normal salt, SHA-384, with normal info with missing deriveKey usage",0,null,null],["Derived key of type name: AES-CTR length: 128 using long derivedKey, normal salt, SHA-384, with normal info with wrong (ECDH) key",0,null,null],["Derived key of type name: AES-CTR length: 192 using long derivedKey, normal salt, SHA-384, with normal info",0,null,null],["Derived key of type name: AES-CTR length: 192 using long derivedKey, normal salt, SHA-384, with normal info with bad hash name SHA384",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-CTR length: 192 using long derivedKey, normal salt, SHA-384, with normal info with missing deriveKey usage",0,null,null],["Derived key of type name: AES-CTR length: 192 using long derivedKey, normal salt, SHA-384, with normal info with wrong (ECDH) key",0,null,null],["Derived key of type name: AES-CTR length: 256 using long derivedKey, normal salt, SHA-384, with normal info",0,null,null],["Derived key of type name: AES-CTR length: 256 using long derivedKey, normal salt, SHA-384, with normal info with bad hash name SHA384",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-CTR length: 256 using long derivedKey, normal salt, SHA-384, with normal info with missing deriveKey usage",0,null,null],["Derived key of type name: AES-CTR length: 256 using long derivedKey, normal salt, SHA-384, with normal info with wrong (ECDH) key",0,null,null],["Derived key of type name: AES-GCM length: 128 using long derivedKey, normal salt, SHA-384, with normal info",0,null,null],["Derived key of type name: AES-GCM length: 128 using long derivedKey, normal salt, SHA-384, with normal info with bad hash name SHA384",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-GCM length: 128 using long derivedKey, normal salt, SHA-384, with normal info with missing deriveKey usage",0,null,null],["Derived key of type name: AES-GCM length: 128 using long derivedKey, normal salt, SHA-384, with normal info with wrong (ECDH) key",0,null,null],["Derived key of type name: AES-GCM length: 192 using long derivedKey, normal salt, SHA-384, with normal info",0,null,null],["Derived key of type name: AES-GCM length: 192 using long derivedKey, normal salt, SHA-384, with normal info with bad hash name SHA384",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-GCM length: 192 using long derivedKey, normal salt, SHA-384, with normal info with missing deriveKey usage",0,null,null],["Derived key of type name: AES-GCM length: 192 using long derivedKey, normal salt, SHA-384, with normal info with wrong (ECDH) key",0,null,null],["Derived key of type name: AES-GCM length: 256 using long derivedKey, normal salt, SHA-384, with normal info",0,null,null],["Derived key of type name: AES-GCM length: 256 using long derivedKey, normal salt, SHA-384, with normal info with bad hash name SHA384",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-GCM length: 256 using long derivedKey, normal salt, SHA-384, with normal info with missing deriveKey usage",0,null,null],["Derived key of type name: AES-GCM length: 256 using long derivedKey, normal salt, SHA-384, with normal info with wrong (ECDH) key",0,null,null],["Derived key of type name: AES-KW length: 128 using long derivedKey, normal salt, SHA-384, with normal info",0,null,null],["Derived key of type name: AES-KW length: 128 using long derivedKey, normal salt, SHA-384, with normal info with bad hash name SHA384",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-KW length: 128 using long derivedKey, normal salt, SHA-384, with normal info with missing deriveKey usage",0,null,null],["Derived key of type name: AES-KW length: 128 using long derivedKey, normal salt, SHA-384, with normal info with wrong (ECDH) key",0,null,null],["Derived key of type name: AES-KW length: 192 using long derivedKey, normal salt, SHA-384, with normal info",0,null,null],["Derived key of type name: AES-KW length: 192 using long derivedKey, normal salt, SHA-384, with normal info with bad hash name SHA384",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-KW length: 192 using long derivedKey, normal salt, SHA-384, with normal info with missing deriveKey usage",0,null,null],["Derived key of type name: AES-KW length: 192 using long derivedKey, normal salt, SHA-384, with normal info with wrong (ECDH) key",0,null,null],["Derived key of type name: AES-KW length: 256 using long derivedKey, normal salt, SHA-384, with normal info",0,null,null],["Derived key of type name: AES-KW length: 256 using long derivedKey, normal salt, SHA-384, with normal info with bad hash name SHA384",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-KW length: 256 using long derivedKey, normal salt, SHA-384, with normal info with missing deriveKey usage",0,null,null],["Derived key of type name: AES-KW length: 256 using long derivedKey, normal salt, SHA-384, with normal info with wrong (ECDH) key",0,null,null],["Derived key of type name: HMAC hash: SHA-1 length: 256 using long derivedKey, normal salt, SHA-384, with normal info",0,null,null],["Derived key of type name: HMAC hash: SHA-1 length: 256 using long derivedKey, normal salt, SHA-384, with normal info with bad hash name SHA384",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: HMAC hash: SHA-1 length: 256 using long derivedKey, normal salt, SHA-384, with normal info with missing deriveKey usage",0,null,null],["Derived key of type name: HMAC hash: SHA-1 length: 256 using long derivedKey, normal salt, SHA-384, with normal info with wrong (ECDH) key",0,null,null],["Derived key of type name: HMAC hash: SHA-256 length: 256 using long derivedKey, normal salt, SHA-384, with normal info",0,null,null],["Derived key of type name: HMAC hash: SHA-256 length: 256 using long derivedKey, normal salt, SHA-384, with normal info with bad hash name SHA384",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: HMAC hash: SHA-256 length: 256 using long derivedKey, normal salt, SHA-384, with normal info with missing deriveKey usage",0,null,null],["Derived key of type name: HMAC hash: SHA-256 length: 256 using long derivedKey, normal salt, SHA-384, with normal info with wrong (ECDH) key",0,null,null],["Derived key of type name: HMAC hash: SHA-384 length: 256 using long derivedKey, normal salt, SHA-384, with normal info",0,null,null],["Derived key of type name: HMAC hash: SHA-384 length: 256 using long derivedKey, normal salt, SHA-384, with normal info with bad hash name SHA384",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: HMAC hash: SHA-384 length: 256 using long derivedKey, normal salt, SHA-384, with normal info with missing deriveKey usage",0,null,null],["Derived key of type name: HMAC hash: SHA-384 length: 256 using long derivedKey, normal salt, SHA-384, with normal info with wrong (ECDH) key",0,null,null],["Derived key of type name: HMAC hash: SHA-512 length: 256 using long derivedKey, normal salt, SHA-384, with normal info",0,null,null],["Derived key of type name: HMAC hash: SHA-512 length: 256 using long derivedKey, normal salt, SHA-384, with normal info with bad hash name SHA384",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: HMAC hash: SHA-512 length: 256 using long derivedKey, normal salt, SHA-384, with normal info with missing deriveKey usage",0,null,null],["Derived key of type name: HMAC hash: SHA-512 length: 256 using long derivedKey, normal salt, SHA-384, with normal info with wrong (ECDH) key",0,null,null],["long derivedKey, normal salt, SHA-384, with normal info with missing salt",1,"assert_equals: deriveBits missing salt correctly threw OperationError: An invalid or illegal string was specified expected \"TypeError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:128:33\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:124:36\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:123:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["long derivedKey, normal salt, SHA-384, with normal info with missing info",1,"assert_equals: deriveBits missing info correctly threw OperationError: An invalid or illegal string was specified expected \"TypeError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:138:33\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:134:36\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:133:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["long derivedKey, normal salt, SHA-384, with normal info with null length",1,"assert_equals: deriveBits with null length correctly threw OperationError: Data provided to an operation does not meet requirements expected \"TypeError\" but got \"DataError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:148:33\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:144:36\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:143:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["long derivedKey, normal salt, SHA-384, with normal info with non-multiple of 8 length",1,"assert_unreached: non-multiple of 8 length should have thrown an OperationError Reached unreachable code","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:156:33\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:154:36\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:153:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["long derivedKey, normal salt, SHA-384, with normal info with bad hash name SHA384",1,"assert_equals: deriveBits with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:170:33\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:166:36\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:164:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["long derivedKey, normal salt, SHA-384, with normal info with missing deriveBits usage",0,null,null],["long derivedKey, normal salt, SHA-384, with normal info with wrong (ECDH) key",0,null,null],["long derivedKey, normal salt, SHA-384, with empty info",0,null,null],["long derivedKey, normal salt, SHA-384, with empty info with 0 length",1,"assert_equals: deriveBits with 0 length correctly threw OperationError: Data provided to an operation does not meet requirements expected \"OperationError\" but got \"DataError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:54:33\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:50:36\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:49:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-CBC length: 128 using long derivedKey, normal salt, SHA-384, with empty info",0,null,null],["Derived key of type name: AES-CBC length: 128 using long derivedKey, normal salt, SHA-384, with empty info with bad hash name SHA384",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-CBC length: 128 using long derivedKey, normal salt, SHA-384, with empty info with missing deriveKey usage",0,null,null],["Derived key of type name: AES-CBC length: 128 using long derivedKey, normal salt, SHA-384, with empty info with wrong (ECDH) key",0,null,null],["Derived key of type name: AES-CBC length: 192 using long derivedKey, normal salt, SHA-384, with empty info",0,null,null],["Derived key of type name: AES-CBC length: 192 using long derivedKey, normal salt, SHA-384, with empty info with bad hash name SHA384",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-CBC length: 192 using long derivedKey, normal salt, SHA-384, with empty info with missing deriveKey usage",0,null,null],["Derived key of type name: AES-CBC length: 192 using long derivedKey, normal salt, SHA-384, with empty info with wrong (ECDH) key",0,null,null],["Derived key of type name: AES-CBC length: 256 using long derivedKey, normal salt, SHA-384, with empty info",0,null,null],["Derived key of type name: AES-CBC length: 256 using long derivedKey, normal salt, SHA-384, with empty info with bad hash name SHA384",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-CBC length: 256 using long derivedKey, normal salt, SHA-384, with empty info with missing deriveKey usage",0,null,null],["Derived key of type name: AES-CBC length: 256 using long derivedKey, normal salt, SHA-384, with empty info with wrong (ECDH) key",0,null,null],["Derived key of type name: AES-CTR length: 128 using long derivedKey, normal salt, SHA-384, with empty info",0,null,null],["Derived key of type name: AES-CTR length: 128 using long derivedKey, normal salt, SHA-384, with empty info with bad hash name SHA384",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-CTR length: 128 using long derivedKey, normal salt, SHA-384, with empty info with missing deriveKey usage",0,null,null],["Derived key of type name: AES-CTR length: 128 using long derivedKey, normal salt, SHA-384, with empty info with wrong (ECDH) key",0,null,null],["Derived key of type name: AES-CTR length: 192 using long derivedKey, normal salt, SHA-384, with empty info",0,null,null],["Derived key of type name: AES-CTR length: 192 using long derivedKey, normal salt, SHA-384, with empty info with bad hash name SHA384",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-CTR length: 192 using long derivedKey, normal salt, SHA-384, with empty info with missing deriveKey usage",0,null,null],["Derived key of type name: AES-CTR length: 192 using long derivedKey, normal salt, SHA-384, with empty info with wrong (ECDH) key",0,null,null],["Derived key of type name: AES-CTR length: 256 using long derivedKey, normal salt, SHA-384, with empty info",0,null,null],["Derived key of type name: AES-CTR length: 256 using long derivedKey, normal salt, SHA-384, with empty info with bad hash name SHA384",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-CTR length: 256 using long derivedKey, normal salt, SHA-384, with empty info with missing deriveKey usage",0,null,null],["Derived key of type name: AES-CTR length: 256 using long derivedKey, normal salt, SHA-384, with empty info with wrong (ECDH) key",0,null,null],["Derived key of type name: AES-GCM length: 128 using long derivedKey, normal salt, SHA-384, with empty info",0,null,null],["Derived key of type name: AES-GCM length: 128 using long derivedKey, normal salt, SHA-384, with empty info with bad hash name SHA384",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-GCM length: 128 using long derivedKey, normal salt, SHA-384, with empty info with missing deriveKey usage",0,null,null],["Derived key of type name: AES-GCM length: 128 using long derivedKey, normal salt, SHA-384, with empty info with wrong (ECDH) key",0,null,null],["Derived key of type name: AES-GCM length: 192 using long derivedKey, normal salt, SHA-384, with empty info",0,null,null],["Derived key of type name: AES-GCM length: 192 using long derivedKey, normal salt, SHA-384, with empty info with bad hash name SHA384",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-GCM length: 192 using long derivedKey, normal salt, SHA-384, with empty info with missing deriveKey usage",0,null,null],["Derived key of type name: AES-GCM length: 192 using long derivedKey, normal salt, SHA-384, with empty info with wrong (ECDH) key",0,null,null],["Derived key of type name: AES-GCM length: 256 using long derivedKey, normal salt, SHA-384, with empty info",0,null,null],["Derived key of type name: AES-GCM length: 256 using long derivedKey, normal salt, SHA-384, with empty info with bad hash name SHA384",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-GCM length: 256 using long derivedKey, normal salt, SHA-384, with empty info with missing deriveKey usage",0,null,null],["Derived key of type name: AES-GCM length: 256 using long derivedKey, normal salt, SHA-384, with empty info with wrong (ECDH) key",0,null,null],["Derived key of type name: AES-KW length: 128 using long derivedKey, normal salt, SHA-384, with empty info",0,null,null],["Derived key of type name: AES-KW length: 128 using long derivedKey, normal salt, SHA-384, with empty info with bad hash name SHA384",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-KW length: 128 using long derivedKey, normal salt, SHA-384, with empty info with missing deriveKey usage",0,null,null],["Derived key of type name: AES-KW length: 128 using long derivedKey, normal salt, SHA-384, with empty info with wrong (ECDH) key",0,null,null],["Derived key of type name: AES-KW length: 192 using long derivedKey, normal salt, SHA-384, with empty info",0,null,null],["Derived key of type name: AES-KW length: 192 using long derivedKey, normal salt, SHA-384, with empty info with bad hash name SHA384",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-KW length: 192 using long derivedKey, normal salt, SHA-384, with empty info with missing deriveKey usage",0,null,null],["Derived key of type name: AES-KW length: 192 using long derivedKey, normal salt, SHA-384, with empty info with wrong (ECDH) key",0,null,null],["Derived key of type name: AES-KW length: 256 using long derivedKey, normal salt, SHA-384, with empty info",0,null,null],["Derived key of type name: AES-KW length: 256 using long derivedKey, normal salt, SHA-384, with empty info with bad hash name SHA384",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-KW length: 256 using long derivedKey, normal salt, SHA-384, with empty info with missing deriveKey usage",0,null,null],["Derived key of type name: AES-KW length: 256 using long derivedKey, normal salt, SHA-384, with empty info with wrong (ECDH) key",0,null,null],["Derived key of type name: HMAC hash: SHA-1 length: 256 using long derivedKey, normal salt, SHA-384, with empty info",0,null,null],["Derived key of type name: HMAC hash: SHA-1 length: 256 using long derivedKey, normal salt, SHA-384, with empty info with bad hash name SHA384",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: HMAC hash: SHA-1 length: 256 using long derivedKey, normal salt, SHA-384, with empty info with missing deriveKey usage",0,null,null],["Derived key of type name: HMAC hash: SHA-1 length: 256 using long derivedKey, normal salt, SHA-384, with empty info with wrong (ECDH) key",0,null,null],["Derived key of type name: HMAC hash: SHA-256 length: 256 using long derivedKey, normal salt, SHA-384, with empty info",0,null,null],["Derived key of type name: HMAC hash: SHA-256 length: 256 using long derivedKey, normal salt, SHA-384, with empty info with bad hash name SHA384",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: HMAC hash: SHA-256 length: 256 using long derivedKey, normal salt, SHA-384, with empty info with missing deriveKey usage",0,null,null],["Derived key of type name: HMAC hash: SHA-256 length: 256 using long derivedKey, normal salt, SHA-384, with empty info with wrong (ECDH) key",0,null,null],["Derived key of type name: HMAC hash: SHA-384 length: 256 using long derivedKey, normal salt, SHA-384, with empty info",0,null,null],["Derived key of type name: HMAC hash: SHA-384 length: 256 using long derivedKey, normal salt, SHA-384, with empty info with bad hash name SHA384",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: HMAC hash: SHA-384 length: 256 using long derivedKey, normal salt, SHA-384, with empty info with missing deriveKey usage",0,null,null],["Derived key of type name: HMAC hash: SHA-384 length: 256 using long derivedKey, normal salt, SHA-384, with empty info with wrong (ECDH) key",0,null,null],["Derived key of type name: HMAC hash: SHA-512 length: 256 using long derivedKey, normal salt, SHA-384, with empty info",0,null,null],["Derived key of type name: HMAC hash: SHA-512 length: 256 using long derivedKey, normal salt, SHA-384, with empty info with bad hash name SHA384",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: HMAC hash: SHA-512 length: 256 using long derivedKey, normal salt, SHA-384, with empty info with missing deriveKey usage",0,null,null],["Derived key of type name: HMAC hash: SHA-512 length: 256 using long derivedKey, normal salt, SHA-384, with empty info with wrong (ECDH) key",0,null,null],["long derivedKey, normal salt, SHA-384, with empty info with missing salt",1,"assert_equals: deriveBits missing salt correctly threw OperationError: An invalid or illegal string was specified expected \"TypeError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:128:33\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:124:36\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:123:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["long derivedKey, normal salt, SHA-384, with empty info with missing info",1,"assert_equals: deriveBits missing info correctly threw OperationError: An invalid or illegal string was specified expected \"TypeError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:138:33\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:134:36\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:133:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["long derivedKey, normal salt, SHA-384, with empty info with null length",1,"assert_equals: deriveBits with null length correctly threw OperationError: Data provided to an operation does not meet requirements expected \"TypeError\" but got \"DataError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:148:33\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:144:36\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:143:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["long derivedKey, normal salt, SHA-384, with empty info with non-multiple of 8 length",1,"assert_unreached: non-multiple of 8 length should have thrown an OperationError Reached unreachable code","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:156:33\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:154:36\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:153:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["long derivedKey, normal salt, SHA-384, with empty info with bad hash name SHA384",1,"assert_equals: deriveBits with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:170:33\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:166:36\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:164:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["long derivedKey, normal salt, SHA-384, with empty info with missing deriveBits usage",0,null,null],["long derivedKey, normal salt, SHA-384, with empty info with wrong (ECDH) key",0,null,null],["long derivedKey, normal salt, SHA-512, with normal info",0,null,null],["long derivedKey, normal salt, SHA-512, with normal info with 0 length",1,"assert_equals: deriveBits with 0 length correctly threw OperationError: Data provided to an operation does not meet requirements expected \"OperationError\" but got \"DataError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:54:33\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:50:36\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:49:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-CBC length: 128 using long derivedKey, normal salt, SHA-512, with normal info",0,null,null],["Derived key of type name: AES-CBC length: 128 using long derivedKey, normal salt, SHA-512, with normal info with bad hash name SHA512",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-CBC length: 128 using long derivedKey, normal salt, SHA-512, with normal info with missing deriveKey usage",0,null,null],["Derived key of type name: AES-CBC length: 128 using long derivedKey, normal salt, SHA-512, with normal info with wrong (ECDH) key",0,null,null],["Derived key of type name: AES-CBC length: 192 using long derivedKey, normal salt, SHA-512, with normal info",0,null,null],["Derived key of type name: AES-CBC length: 192 using long derivedKey, normal salt, SHA-512, with normal info with bad hash name SHA512",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-CBC length: 192 using long derivedKey, normal salt, SHA-512, with normal info with missing deriveKey usage",0,null,null],["Derived key of type name: AES-CBC length: 192 using long derivedKey, normal salt, SHA-512, with normal info with wrong (ECDH) key",0,null,null],["Derived key of type name: AES-CBC length: 256 using long derivedKey, normal salt, SHA-512, with normal info",0,null,null],["Derived key of type name: AES-CBC length: 256 using long derivedKey, normal salt, SHA-512, with normal info with bad hash name SHA512",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-CBC length: 256 using long derivedKey, normal salt, SHA-512, with normal info with missing deriveKey usage",0,null,null],["Derived key of type name: AES-CBC length: 256 using long derivedKey, normal salt, SHA-512, with normal info with wrong (ECDH) key",0,null,null],["Derived key of type name: AES-CTR length: 128 using long derivedKey, normal salt, SHA-512, with normal info",0,null,null],["Derived key of type name: AES-CTR length: 128 using long derivedKey, normal salt, SHA-512, with normal info with bad hash name SHA512",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-CTR length: 128 using long derivedKey, normal salt, SHA-512, with normal info with missing deriveKey usage",0,null,null],["Derived key of type name: AES-CTR length: 128 using long derivedKey, normal salt, SHA-512, with normal info with wrong (ECDH) key",0,null,null],["Derived key of type name: AES-CTR length: 192 using long derivedKey, normal salt, SHA-512, with normal info",0,null,null],["Derived key of type name: AES-CTR length: 192 using long derivedKey, normal salt, SHA-512, with normal info with bad hash name SHA512",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-CTR length: 192 using long derivedKey, normal salt, SHA-512, with normal info with missing deriveKey usage",0,null,null],["Derived key of type name: AES-CTR length: 192 using long derivedKey, normal salt, SHA-512, with normal info with wrong (ECDH) key",0,null,null],["Derived key of type name: AES-CTR length: 256 using long derivedKey, normal salt, SHA-512, with normal info",0,null,null],["Derived key of type name: AES-CTR length: 256 using long derivedKey, normal salt, SHA-512, with normal info with bad hash name SHA512",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-CTR length: 256 using long derivedKey, normal salt, SHA-512, with normal info with missing deriveKey usage",0,null,null],["Derived key of type name: AES-CTR length: 256 using long derivedKey, normal salt, SHA-512, with normal info with wrong (ECDH) key",0,null,null],["Derived key of type name: AES-GCM length: 128 using long derivedKey, normal salt, SHA-512, with normal info",0,null,null],["Derived key of type name: AES-GCM length: 128 using long derivedKey, normal salt, SHA-512, with normal info with bad hash name SHA512",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-GCM length: 128 using long derivedKey, normal salt, SHA-512, with normal info with missing deriveKey usage",0,null,null],["Derived key of type name: AES-GCM length: 128 using long derivedKey, normal salt, SHA-512, with normal info with wrong (ECDH) key",0,null,null],["Derived key of type name: AES-GCM length: 192 using long derivedKey, normal salt, SHA-512, with normal info",0,null,null],["Derived key of type name: AES-GCM length: 192 using long derivedKey, normal salt, SHA-512, with normal info with bad hash name SHA512",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-GCM length: 192 using long derivedKey, normal salt, SHA-512, with normal info with missing deriveKey usage",0,null,null],["Derived key of type name: AES-GCM length: 192 using long derivedKey, normal salt, SHA-512, with normal info with wrong (ECDH) key",0,null,null],["Derived key of type name: AES-GCM length: 256 using long derivedKey, normal salt, SHA-512, with normal info",0,null,null],["Derived key of type name: AES-GCM length: 256 using long derivedKey, normal salt, SHA-512, with normal info with bad hash name SHA512",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-GCM length: 256 using long derivedKey, normal salt, SHA-512, with normal info with missing deriveKey usage",0,null,null],["Derived key of type name: AES-GCM length: 256 using long derivedKey, normal salt, SHA-512, with normal info with wrong (ECDH) key",0,null,null],["Derived key of type name: AES-KW length: 128 using long derivedKey, normal salt, SHA-512, with normal info",0,null,null],["Derived key of type name: AES-KW length: 128 using long derivedKey, normal salt, SHA-512, with normal info with bad hash name SHA512",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-KW length: 128 using long derivedKey, normal salt, SHA-512, with normal info with missing deriveKey usage",0,null,null],["Derived key of type name: AES-KW length: 128 using long derivedKey, normal salt, SHA-512, with normal info with wrong (ECDH) key",0,null,null],["Derived key of type name: AES-KW length: 192 using long derivedKey, normal salt, SHA-512, with normal info",0,null,null],["Derived key of type name: AES-KW length: 192 using long derivedKey, normal salt, SHA-512, with normal info with bad hash name SHA512",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-KW length: 192 using long derivedKey, normal salt, SHA-512, with normal info with missing deriveKey usage",0,null,null],["Derived key of type name: AES-KW length: 192 using long derivedKey, normal salt, SHA-512, with normal info with wrong (ECDH) key",0,null,null],["Derived key of type name: AES-KW length: 256 using long derivedKey, normal salt, SHA-512, with normal info",0,null,null],["Derived key of type name: AES-KW length: 256 using long derivedKey, normal salt, SHA-512, with normal info with bad hash name SHA512",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-KW length: 256 using long derivedKey, normal salt, SHA-512, with normal info with missing deriveKey usage",0,null,null],["Derived key of type name: AES-KW length: 256 using long derivedKey, normal salt, SHA-512, with normal info with wrong (ECDH) key",0,null,null],["Derived key of type name: HMAC hash: SHA-1 length: 256 using long derivedKey, normal salt, SHA-512, with normal info",0,null,null],["Derived key of type name: HMAC hash: SHA-1 length: 256 using long derivedKey, normal salt, SHA-512, with normal info with bad hash name SHA512",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: HMAC hash: SHA-1 length: 256 using long derivedKey, normal salt, SHA-512, with normal info with missing deriveKey usage",0,null,null],["Derived key of type name: HMAC hash: SHA-1 length: 256 using long derivedKey, normal salt, SHA-512, with normal info with wrong (ECDH) key",0,null,null],["Derived key of type name: HMAC hash: SHA-256 length: 256 using long derivedKey, normal salt, SHA-512, with normal info",0,null,null],["Derived key of type name: HMAC hash: SHA-256 length: 256 using long derivedKey, normal salt, SHA-512, with normal info with bad hash name SHA512",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: HMAC hash: SHA-256 length: 256 using long derivedKey, normal salt, SHA-512, with normal info with missing deriveKey usage",0,null,null],["Derived key of type name: HMAC hash: SHA-256 length: 256 using long derivedKey, normal salt, SHA-512, with normal info with wrong (ECDH) key",0,null,null],["Derived key of type name: HMAC hash: SHA-384 length: 256 using long derivedKey, normal salt, SHA-512, with normal info",0,null,null],["Derived key of type name: HMAC hash: SHA-384 length: 256 using long derivedKey, normal salt, SHA-512, with normal info with bad hash name SHA512",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: HMAC hash: SHA-384 length: 256 using long derivedKey, normal salt, SHA-512, with normal info with missing deriveKey usage",0,null,null],["Derived key of type name: HMAC hash: SHA-384 length: 256 using long derivedKey, normal salt, SHA-512, with normal info with wrong (ECDH) key",0,null,null],["Derived key of type name: HMAC hash: SHA-512 length: 256 using long derivedKey, normal salt, SHA-512, with normal info",0,null,null],["Derived key of type name: HMAC hash: SHA-512 length: 256 using long derivedKey, normal salt, SHA-512, with normal info with bad hash name SHA512",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: HMAC hash: SHA-512 length: 256 using long derivedKey, normal salt, SHA-512, with normal info with missing deriveKey usage",0,null,null],["Derived key of type name: HMAC hash: SHA-512 length: 256 using long derivedKey, normal salt, SHA-512, with normal info with wrong (ECDH) key",0,null,null],["long derivedKey, normal salt, SHA-512, with normal info with missing salt",1,"assert_equals: deriveBits missing salt correctly threw OperationError: An invalid or illegal string was specified expected \"TypeError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:128:33\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:124:36\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:123:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["long derivedKey, normal salt, SHA-512, with normal info with missing info",1,"assert_equals: deriveBits missing info correctly threw OperationError: An invalid or illegal string was specified expected \"TypeError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:138:33\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:134:36\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:133:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["long derivedKey, normal salt, SHA-512, with normal info with null length",1,"assert_equals: deriveBits with null length correctly threw OperationError: Data provided to an operation does not meet requirements expected \"TypeError\" but got \"DataError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:148:33\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:144:36\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:143:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["long derivedKey, normal salt, SHA-512, with normal info with non-multiple of 8 length",1,"assert_unreached: non-multiple of 8 length should have thrown an OperationError Reached unreachable code","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:156:33\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:154:36\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:153:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["long derivedKey, normal salt, SHA-512, with normal info with bad hash name SHA512",1,"assert_equals: deriveBits with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:170:33\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:166:36\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:164:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["long derivedKey, normal salt, SHA-512, with normal info with missing deriveBits usage",0,null,null],["long derivedKey, normal salt, SHA-512, with normal info with wrong (ECDH) key",0,null,null],["long derivedKey, normal salt, SHA-512, with empty info",0,null,null],["long derivedKey, normal salt, SHA-512, with empty info with 0 length",1,"assert_equals: deriveBits with 0 length correctly threw OperationError: Data provided to an operation does not meet requirements expected \"OperationError\" but got \"DataError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:54:33\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:50:36\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:49:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-CBC length: 128 using long derivedKey, normal salt, SHA-512, with empty info",0,null,null],["Derived key of type name: AES-CBC length: 128 using long derivedKey, normal salt, SHA-512, with empty info with bad hash name SHA512",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-CBC length: 128 using long derivedKey, normal salt, SHA-512, with empty info with missing deriveKey usage",0,null,null],["Derived key of type name: AES-CBC length: 128 using long derivedKey, normal salt, SHA-512, with empty info with wrong (ECDH) key",0,null,null],["Derived key of type name: AES-CBC length: 192 using long derivedKey, normal salt, SHA-512, with empty info",0,null,null],["Derived key of type name: AES-CBC length: 192 using long derivedKey, normal salt, SHA-512, with empty info with bad hash name SHA512",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-CBC length: 192 using long derivedKey, normal salt, SHA-512, with empty info with missing deriveKey usage",0,null,null],["Derived key of type name: AES-CBC length: 192 using long derivedKey, normal salt, SHA-512, with empty info with wrong (ECDH) key",0,null,null],["Derived key of type name: AES-CBC length: 256 using long derivedKey, normal salt, SHA-512, with empty info",0,null,null],["Derived key of type name: AES-CBC length: 256 using long derivedKey, normal salt, SHA-512, with empty info with bad hash name SHA512",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-CBC length: 256 using long derivedKey, normal salt, SHA-512, with empty info with missing deriveKey usage",0,null,null],["Derived key of type name: AES-CBC length: 256 using long derivedKey, normal salt, SHA-512, with empty info with wrong (ECDH) key",0,null,null],["Derived key of type name: AES-CTR length: 128 using long derivedKey, normal salt, SHA-512, with empty info",0,null,null],["Derived key of type name: AES-CTR length: 128 using long derivedKey, normal salt, SHA-512, with empty info with bad hash name SHA512",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-CTR length: 128 using long derivedKey, normal salt, SHA-512, with empty info with missing deriveKey usage",0,null,null],["Derived key of type name: AES-CTR length: 128 using long derivedKey, normal salt, SHA-512, with empty info with wrong (ECDH) key",0,null,null],["Derived key of type name: AES-CTR length: 192 using long derivedKey, normal salt, SHA-512, with empty info",0,null,null],["Derived key of type name: AES-CTR length: 192 using long derivedKey, normal salt, SHA-512, with empty info with bad hash name SHA512",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-CTR length: 192 using long derivedKey, normal salt, SHA-512, with empty info with missing deriveKey usage",0,null,null],["Derived key of type name: AES-CTR length: 192 using long derivedKey, normal salt, SHA-512, with empty info with wrong (ECDH) key",0,null,null],["Derived key of type name: AES-CTR length: 256 using long derivedKey, normal salt, SHA-512, with empty info",0,null,null],["Derived key of type name: AES-CTR length: 256 using long derivedKey, normal salt, SHA-512, with empty info with bad hash name SHA512",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-CTR length: 256 using long derivedKey, normal salt, SHA-512, with empty info with missing deriveKey usage",0,null,null],["Derived key of type name: AES-CTR length: 256 using long derivedKey, normal salt, SHA-512, with empty info with wrong (ECDH) key",0,null,null],["Derived key of type name: AES-GCM length: 128 using long derivedKey, normal salt, SHA-512, with empty info",0,null,null],["Derived key of type name: AES-GCM length: 128 using long derivedKey, normal salt, SHA-512, with empty info with bad hash name SHA512",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-GCM length: 128 using long derivedKey, normal salt, SHA-512, with empty info with missing deriveKey usage",0,null,null],["Derived key of type name: AES-GCM length: 128 using long derivedKey, normal salt, SHA-512, with empty info with wrong (ECDH) key",0,null,null],["Derived key of type name: AES-GCM length: 192 using long derivedKey, normal salt, SHA-512, with empty info",0,null,null],["Derived key of type name: AES-GCM length: 192 using long derivedKey, normal salt, SHA-512, with empty info with bad hash name SHA512",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-GCM length: 192 using long derivedKey, normal salt, SHA-512, with empty info with missing deriveKey usage",0,null,null],["Derived key of type name: AES-GCM length: 192 using long derivedKey, normal salt, SHA-512, with empty info with wrong (ECDH) key",0,null,null],["Derived key of type name: AES-GCM length: 256 using long derivedKey, normal salt, SHA-512, with empty info",0,null,null],["Derived key of type name: AES-GCM length: 256 using long derivedKey, normal salt, SHA-512, with empty info with bad hash name SHA512",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-GCM length: 256 using long derivedKey, normal salt, SHA-512, with empty info with missing deriveKey usage",0,null,null],["Derived key of type name: AES-GCM length: 256 using long derivedKey, normal salt, SHA-512, with empty info with wrong (ECDH) key",0,null,null],["Derived key of type name: AES-KW length: 128 using long derivedKey, normal salt, SHA-512, with empty info",0,null,null],["Derived key of type name: AES-KW length: 128 using long derivedKey, normal salt, SHA-512, with empty info with bad hash name SHA512",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-KW length: 128 using long derivedKey, normal salt, SHA-512, with empty info with missing deriveKey usage",0,null,null],["Derived key of type name: AES-KW length: 128 using long derivedKey, normal salt, SHA-512, with empty info with wrong (ECDH) key",0,null,null],["Derived key of type name: AES-KW length: 192 using long derivedKey, normal salt, SHA-512, with empty info",0,null,null],["Derived key of type name: AES-KW length: 192 using long derivedKey, normal salt, SHA-512, with empty info with bad hash name SHA512",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-KW length: 192 using long derivedKey, normal salt, SHA-512, with empty info with missing deriveKey usage",0,null,null],["Derived key of type name: AES-KW length: 192 using long derivedKey, normal salt, SHA-512, with empty info with wrong (ECDH) key",0,null,null],["Derived key of type name: AES-KW length: 256 using long derivedKey, normal salt, SHA-512, with empty info",0,null,null],["Derived key of type name: AES-KW length: 256 using long derivedKey, normal salt, SHA-512, with empty info with bad hash name SHA512",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-KW length: 256 using long derivedKey, normal salt, SHA-512, with empty info with missing deriveKey usage",0,null,null],["Derived key of type name: AES-KW length: 256 using long derivedKey, normal salt, SHA-512, with empty info with wrong (ECDH) key",0,null,null],["Derived key of type name: HMAC hash: SHA-1 length: 256 using long derivedKey, normal salt, SHA-512, with empty info",0,null,null],["Derived key of type name: HMAC hash: SHA-1 length: 256 using long derivedKey, normal salt, SHA-512, with empty info with bad hash name SHA512",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: HMAC hash: SHA-1 length: 256 using long derivedKey, normal salt, SHA-512, with empty info with missing deriveKey usage",0,null,null],["Derived key of type name: HMAC hash: SHA-1 length: 256 using long derivedKey, normal salt, SHA-512, with empty info with wrong (ECDH) key",0,null,null],["Derived key of type name: HMAC hash: SHA-256 length: 256 using long derivedKey, normal salt, SHA-512, with empty info",0,null,null],["Derived key of type name: HMAC hash: SHA-256 length: 256 using long derivedKey, normal salt, SHA-512, with empty info with bad hash name SHA512",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: HMAC hash: SHA-256 length: 256 using long derivedKey, normal salt, SHA-512, with empty info with missing deriveKey usage",0,null,null],["Derived key of type name: HMAC hash: SHA-256 length: 256 using long derivedKey, normal salt, SHA-512, with empty info with wrong (ECDH) key",0,null,null],["Derived key of type name: HMAC hash: SHA-384 length: 256 using long derivedKey, normal salt, SHA-512, with empty info",0,null,null],["Derived key of type name: HMAC hash: SHA-384 length: 256 using long derivedKey, normal salt, SHA-512, with empty info with bad hash name SHA512",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: HMAC hash: SHA-384 length: 256 using long derivedKey, normal salt, SHA-512, with empty info with missing deriveKey usage",0,null,null],["Derived key of type name: HMAC hash: SHA-384 length: 256 using long derivedKey, normal salt, SHA-512, with empty info with wrong (ECDH) key",0,null,null],["Derived key of type name: HMAC hash: SHA-512 length: 256 using long derivedKey, normal salt, SHA-512, with empty info",0,null,null],["Derived key of type name: HMAC hash: SHA-512 length: 256 using long derivedKey, normal salt, SHA-512, with empty info with bad hash name SHA512",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: HMAC hash: SHA-512 length: 256 using long derivedKey, normal salt, SHA-512, with empty info with missing deriveKey usage",0,null,null],["Derived key of type name: HMAC hash: SHA-512 length: 256 using long derivedKey, normal salt, SHA-512, with empty info with wrong (ECDH) key",0,null,null],["long derivedKey, normal salt, SHA-512, with empty info with missing salt",1,"assert_equals: deriveBits missing salt correctly threw OperationError: An invalid or illegal string was specified expected \"TypeError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:128:33\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:124:36\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:123:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["long derivedKey, normal salt, SHA-512, with empty info with missing info",1,"assert_equals: deriveBits missing info correctly threw OperationError: An invalid or illegal string was specified expected \"TypeError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:138:33\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:134:36\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:133:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["long derivedKey, normal salt, SHA-512, with empty info with null length",1,"assert_equals: deriveBits with null length correctly threw OperationError: Data provided to an operation does not meet requirements expected \"TypeError\" but got \"DataError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:148:33\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:144:36\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:143:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["long derivedKey, normal salt, SHA-512, with empty info with non-multiple of 8 length",1,"assert_unreached: non-multiple of 8 length should have thrown an OperationError Reached unreachable code","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:156:33\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:154:36\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:153:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["long derivedKey, normal salt, SHA-512, with empty info with bad hash name SHA512",1,"assert_equals: deriveBits with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:170:33\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:166:36\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:164:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["long derivedKey, normal salt, SHA-512, with empty info with missing deriveBits usage",0,null,null],["long derivedKey, normal salt, SHA-512, with empty info with wrong (ECDH) key",0,null,null],["long derivedKey, normal salt, SHA-1, with normal info",0,null,null],["long derivedKey, normal salt, SHA-1, with normal info with 0 length",1,"assert_equals: deriveBits with 0 length correctly threw OperationError: Data provided to an operation does not meet requirements expected \"OperationError\" but got \"DataError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:54:33\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:50:36\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:49:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-CBC length: 128 using long derivedKey, normal salt, SHA-1, with normal info",0,null,null],["Derived key of type name: AES-CBC length: 128 using long derivedKey, normal salt, SHA-1, with normal info with bad hash name SHA1",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-CBC length: 128 using long derivedKey, normal salt, SHA-1, with normal info with missing deriveKey usage",0,null,null],["Derived key of type name: AES-CBC length: 128 using long derivedKey, normal salt, SHA-1, with normal info with wrong (ECDH) key",0,null,null],["Derived key of type name: AES-CBC length: 192 using long derivedKey, normal salt, SHA-1, with normal info",0,null,null],["Derived key of type name: AES-CBC length: 192 using long derivedKey, normal salt, SHA-1, with normal info with bad hash name SHA1",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-CBC length: 192 using long derivedKey, normal salt, SHA-1, with normal info with missing deriveKey usage",0,null,null],["Derived key of type name: AES-CBC length: 192 using long derivedKey, normal salt, SHA-1, with normal info with wrong (ECDH) key",0,null,null],["Derived key of type name: AES-CBC length: 256 using long derivedKey, normal salt, SHA-1, with normal info",0,null,null],["Derived key of type name: AES-CBC length: 256 using long derivedKey, normal salt, SHA-1, with normal info with bad hash name SHA1",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-CBC length: 256 using long derivedKey, normal salt, SHA-1, with normal info with missing deriveKey usage",0,null,null],["Derived key of type name: AES-CBC length: 256 using long derivedKey, normal salt, SHA-1, with normal info with wrong (ECDH) key",0,null,null],["Derived key of type name: AES-CTR length: 128 using long derivedKey, normal salt, SHA-1, with normal info",0,null,null],["Derived key of type name: AES-CTR length: 128 using long derivedKey, normal salt, SHA-1, with normal info with bad hash name SHA1",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-CTR length: 128 using long derivedKey, normal salt, SHA-1, with normal info with missing deriveKey usage",0,null,null],["Derived key of type name: AES-CTR length: 128 using long derivedKey, normal salt, SHA-1, with normal info with wrong (ECDH) key",0,null,null],["Derived key of type name: AES-CTR length: 192 using long derivedKey, normal salt, SHA-1, with normal info",0,null,null],["Derived key of type name: AES-CTR length: 192 using long derivedKey, normal salt, SHA-1, with normal info with bad hash name SHA1",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-CTR length: 192 using long derivedKey, normal salt, SHA-1, with normal info with missing deriveKey usage",0,null,null],["Derived key of type name: AES-CTR length: 192 using long derivedKey, normal salt, SHA-1, with normal info with wrong (ECDH) key",0,null,null],["Derived key of type name: AES-CTR length: 256 using long derivedKey, normal salt, SHA-1, with normal info",0,null,null],["Derived key of type name: AES-CTR length: 256 using long derivedKey, normal salt, SHA-1, with normal info with bad hash name SHA1",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-CTR length: 256 using long derivedKey, normal salt, SHA-1, with normal info with missing deriveKey usage",0,null,null],["Derived key of type name: AES-CTR length: 256 using long derivedKey, normal salt, SHA-1, with normal info with wrong (ECDH) key",0,null,null],["Derived key of type name: AES-GCM length: 128 using long derivedKey, normal salt, SHA-1, with normal info",0,null,null],["Derived key of type name: AES-GCM length: 128 using long derivedKey, normal salt, SHA-1, with normal info with bad hash name SHA1",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-GCM length: 128 using long derivedKey, normal salt, SHA-1, with normal info with missing deriveKey usage",0,null,null],["Derived key of type name: AES-GCM length: 128 using long derivedKey, normal salt, SHA-1, with normal info with wrong (ECDH) key",0,null,null],["Derived key of type name: AES-GCM length: 192 using long derivedKey, normal salt, SHA-1, with normal info",0,null,null],["Derived key of type name: AES-GCM length: 192 using long derivedKey, normal salt, SHA-1, with normal info with bad hash name SHA1",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-GCM length: 192 using long derivedKey, normal salt, SHA-1, with normal info with missing deriveKey usage",0,null,null],["Derived key of type name: AES-GCM length: 192 using long derivedKey, normal salt, SHA-1, with normal info with wrong (ECDH) key",0,null,null],["Derived key of type name: AES-GCM length: 256 using long derivedKey, normal salt, SHA-1, with normal info",0,null,null],["Derived key of type name: AES-GCM length: 256 using long derivedKey, normal salt, SHA-1, with normal info with bad hash name SHA1",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-GCM length: 256 using long derivedKey, normal salt, SHA-1, with normal info with missing deriveKey usage",0,null,null],["Derived key of type name: AES-GCM length: 256 using long derivedKey, normal salt, SHA-1, with normal info with wrong (ECDH) key",0,null,null],["Derived key of type name: AES-KW length: 128 using long derivedKey, normal salt, SHA-1, with normal info",0,null,null],["Derived key of type name: AES-KW length: 128 using long derivedKey, normal salt, SHA-1, with normal info with bad hash name SHA1",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-KW length: 128 using long derivedKey, normal salt, SHA-1, with normal info with missing deriveKey usage",0,null,null],["Derived key of type name: AES-KW length: 128 using long derivedKey, normal salt, SHA-1, with normal info with wrong (ECDH) key",0,null,null],["Derived key of type name: AES-KW length: 192 using long derivedKey, normal salt, SHA-1, with normal info",0,null,null],["Derived key of type name: AES-KW length: 192 using long derivedKey, normal salt, SHA-1, with normal info with bad hash name SHA1",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-KW length: 192 using long derivedKey, normal salt, SHA-1, with normal info with missing deriveKey usage",0,null,null],["Derived key of type name: AES-KW length: 192 using long derivedKey, normal salt, SHA-1, with normal info with wrong (ECDH) key",0,null,null],["Derived key of type name: AES-KW length: 256 using long derivedKey, normal salt, SHA-1, with normal info",0,null,null],["Derived key of type name: AES-KW length: 256 using long derivedKey, normal salt, SHA-1, with normal info with bad hash name SHA1",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-KW length: 256 using long derivedKey, normal salt, SHA-1, with normal info with missing deriveKey usage",0,null,null],["Derived key of type name: AES-KW length: 256 using long derivedKey, normal salt, SHA-1, with normal info with wrong (ECDH) key",0,null,null],["Derived key of type name: HMAC hash: SHA-1 length: 256 using long derivedKey, normal salt, SHA-1, with normal info",0,null,null],["Derived key of type name: HMAC hash: SHA-1 length: 256 using long derivedKey, normal salt, SHA-1, with normal info with bad hash name SHA1",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: HMAC hash: SHA-1 length: 256 using long derivedKey, normal salt, SHA-1, with normal info with missing deriveKey usage",0,null,null],["Derived key of type name: HMAC hash: SHA-1 length: 256 using long derivedKey, normal salt, SHA-1, with normal info with wrong (ECDH) key",0,null,null],["Derived key of type name: HMAC hash: SHA-256 length: 256 using long derivedKey, normal salt, SHA-1, with normal info",0,null,null],["Derived key of type name: HMAC hash: SHA-256 length: 256 using long derivedKey, normal salt, SHA-1, with normal info with bad hash name SHA1",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: HMAC hash: SHA-256 length: 256 using long derivedKey, normal salt, SHA-1, with normal info with missing deriveKey usage",0,null,null],["Derived key of type name: HMAC hash: SHA-256 length: 256 using long derivedKey, normal salt, SHA-1, with normal info with wrong (ECDH) key",0,null,null],["Derived key of type name: HMAC hash: SHA-384 length: 256 using long derivedKey, normal salt, SHA-1, with normal info",0,null,null],["Derived key of type name: HMAC hash: SHA-384 length: 256 using long derivedKey, normal salt, SHA-1, with normal info with bad hash name SHA1",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: HMAC hash: SHA-384 length: 256 using long derivedKey, normal salt, SHA-1, with normal info with missing deriveKey usage",0,null,null],["Derived key of type name: HMAC hash: SHA-384 length: 256 using long derivedKey, normal salt, SHA-1, with normal info with wrong (ECDH) key",0,null,null],["Derived key of type name: HMAC hash: SHA-512 length: 256 using long derivedKey, normal salt, SHA-1, with normal info",0,null,null],["Derived key of type name: HMAC hash: SHA-512 length: 256 using long derivedKey, normal salt, SHA-1, with normal info with bad hash name SHA1",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: HMAC hash: SHA-512 length: 256 using long derivedKey, normal salt, SHA-1, with normal info with missing deriveKey usage",0,null,null],["Derived key of type name: HMAC hash: SHA-512 length: 256 using long derivedKey, normal salt, SHA-1, with normal info with wrong (ECDH) key",0,null,null],["long derivedKey, normal salt, SHA-1, with normal info with missing salt",1,"assert_equals: deriveBits missing salt correctly threw OperationError: An invalid or illegal string was specified expected \"TypeError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:128:33\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:124:36\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:123:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["long derivedKey, normal salt, SHA-1, with normal info with missing info",1,"assert_equals: deriveBits missing info correctly threw OperationError: An invalid or illegal string was specified expected \"TypeError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:138:33\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:134:36\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:133:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["long derivedKey, normal salt, SHA-1, with normal info with null length",1,"assert_equals: deriveBits with null length correctly threw OperationError: Data provided to an operation does not meet requirements expected \"TypeError\" but got \"DataError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:148:33\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:144:36\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:143:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["long derivedKey, normal salt, SHA-1, with normal info with non-multiple of 8 length",1,"assert_unreached: non-multiple of 8 length should have thrown an OperationError Reached unreachable code","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:156:33\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:154:36\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:153:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["long derivedKey, normal salt, SHA-1, with normal info with bad hash name SHA1",1,"assert_equals: deriveBits with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:170:33\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:166:36\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:164:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["long derivedKey, normal salt, SHA-1, with normal info with missing deriveBits usage",0,null,null],["long derivedKey, normal salt, SHA-1, with normal info with wrong (ECDH) key",0,null,null],["long derivedKey, normal salt, SHA-1, with empty info",0,null,null],["long derivedKey, normal salt, SHA-1, with empty info with 0 length",1,"assert_equals: deriveBits with 0 length correctly threw OperationError: Data provided to an operation does not meet requirements expected \"OperationError\" but got \"DataError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:54:33\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:50:36\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:49:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-CBC length: 128 using long derivedKey, normal salt, SHA-1, with empty info",0,null,null],["Derived key of type name: AES-CBC length: 128 using long derivedKey, normal salt, SHA-1, with empty info with bad hash name SHA1",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-CBC length: 128 using long derivedKey, normal salt, SHA-1, with empty info with missing deriveKey usage",0,null,null],["Derived key of type name: AES-CBC length: 128 using long derivedKey, normal salt, SHA-1, with empty info with wrong (ECDH) key",0,null,null],["Derived key of type name: AES-CBC length: 192 using long derivedKey, normal salt, SHA-1, with empty info",0,null,null],["Derived key of type name: AES-CBC length: 192 using long derivedKey, normal salt, SHA-1, with empty info with bad hash name SHA1",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-CBC length: 192 using long derivedKey, normal salt, SHA-1, with empty info with missing deriveKey usage",0,null,null],["Derived key of type name: AES-CBC length: 192 using long derivedKey, normal salt, SHA-1, with empty info with wrong (ECDH) key",0,null,null],["Derived key of type name: AES-CBC length: 256 using long derivedKey, normal salt, SHA-1, with empty info",0,null,null],["Derived key of type name: AES-CBC length: 256 using long derivedKey, normal salt, SHA-1, with empty info with bad hash name SHA1",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-CBC length: 256 using long derivedKey, normal salt, SHA-1, with empty info with missing deriveKey usage",0,null,null],["Derived key of type name: AES-CBC length: 256 using long derivedKey, normal salt, SHA-1, with empty info with wrong (ECDH) key",0,null,null],["Derived key of type name: AES-CTR length: 128 using long derivedKey, normal salt, SHA-1, with empty info",0,null,null],["Derived key of type name: AES-CTR length: 128 using long derivedKey, normal salt, SHA-1, with empty info with bad hash name SHA1",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-CTR length: 128 using long derivedKey, normal salt, SHA-1, with empty info with missing deriveKey usage",0,null,null],["Derived key of type name: AES-CTR length: 128 using long derivedKey, normal salt, SHA-1, with empty info with wrong (ECDH) key",0,null,null],["Derived key of type name: AES-CTR length: 192 using long derivedKey, normal salt, SHA-1, with empty info",0,null,null],["Derived key of type name: AES-CTR length: 192 using long derivedKey, normal salt, SHA-1, with empty info with bad hash name SHA1",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-CTR length: 192 using long derivedKey, normal salt, SHA-1, with empty info with missing deriveKey usage",0,null,null],["Derived key of type name: AES-CTR length: 192 using long derivedKey, normal salt, SHA-1, with empty info with wrong (ECDH) key",0,null,null],["Derived key of type name: AES-CTR length: 256 using long derivedKey, normal salt, SHA-1, with empty info",0,null,null],["Derived key of type name: AES-CTR length: 256 using long derivedKey, normal salt, SHA-1, with empty info with bad hash name SHA1",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-CTR length: 256 using long derivedKey, normal salt, SHA-1, with empty info with missing deriveKey usage",0,null,null],["Derived key of type name: AES-CTR length: 256 using long derivedKey, normal salt, SHA-1, with empty info with wrong (ECDH) key",0,null,null],["Derived key of type name: AES-GCM length: 128 using long derivedKey, normal salt, SHA-1, with empty info",0,null,null],["Derived key of type name: AES-GCM length: 128 using long derivedKey, normal salt, SHA-1, with empty info with bad hash name SHA1",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-GCM length: 128 using long derivedKey, normal salt, SHA-1, with empty info with missing deriveKey usage",0,null,null],["Derived key of type name: AES-GCM length: 128 using long derivedKey, normal salt, SHA-1, with empty info with wrong (ECDH) key",0,null,null],["Derived key of type name: AES-GCM length: 192 using long derivedKey, normal salt, SHA-1, with empty info",0,null,null],["Derived key of type name: AES-GCM length: 192 using long derivedKey, normal salt, SHA-1, with empty info with bad hash name SHA1",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-GCM length: 192 using long derivedKey, normal salt, SHA-1, with empty info with missing deriveKey usage",0,null,null],["Derived key of type name: AES-GCM length: 192 using long derivedKey, normal salt, SHA-1, with empty info with wrong (ECDH) key",0,null,null],["Derived key of type name: AES-GCM length: 256 using long derivedKey, normal salt, SHA-1, with empty info",0,null,null],["Derived key of type name: AES-GCM length: 256 using long derivedKey, normal salt, SHA-1, with empty info with bad hash name SHA1",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-GCM length: 256 using long derivedKey, normal salt, SHA-1, with empty info with missing deriveKey usage",0,null,null],["Derived key of type name: AES-GCM length: 256 using long derivedKey, normal salt, SHA-1, with empty info with wrong (ECDH) key",0,null,null],["Derived key of type name: AES-KW length: 128 using long derivedKey, normal salt, SHA-1, with empty info",0,null,null],["Derived key of type name: AES-KW length: 128 using long derivedKey, normal salt, SHA-1, with empty info with bad hash name SHA1",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-KW length: 128 using long derivedKey, normal salt, SHA-1, with empty info with missing deriveKey usage",0,null,null],["Derived key of type name: AES-KW length: 128 using long derivedKey, normal salt, SHA-1, with empty info with wrong (ECDH) key",0,null,null],["Derived key of type name: AES-KW length: 192 using long derivedKey, normal salt, SHA-1, with empty info",0,null,null],["Derived key of type name: AES-KW length: 192 using long derivedKey, normal salt, SHA-1, with empty info with bad hash name SHA1",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-KW length: 192 using long derivedKey, normal salt, SHA-1, with empty info with missing deriveKey usage",0,null,null],["Derived key of type name: AES-KW length: 192 using long derivedKey, normal salt, SHA-1, with empty info with wrong (ECDH) key",0,null,null],["Derived key of type name: AES-KW length: 256 using long derivedKey, normal salt, SHA-1, with empty info",0,null,null],["Derived key of type name: AES-KW length: 256 using long derivedKey, normal salt, SHA-1, with empty info with bad hash name SHA1",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-KW length: 256 using long derivedKey, normal salt, SHA-1, with empty info with missing deriveKey usage",0,null,null],["Derived key of type name: AES-KW length: 256 using long derivedKey, normal salt, SHA-1, with empty info with wrong (ECDH) key",0,null,null],["Derived key of type name: HMAC hash: SHA-1 length: 256 using long derivedKey, normal salt, SHA-1, with empty info",0,null,null],["Derived key of type name: HMAC hash: SHA-1 length: 256 using long derivedKey, normal salt, SHA-1, with empty info with bad hash name SHA1",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: HMAC hash: SHA-1 length: 256 using long derivedKey, normal salt, SHA-1, with empty info with missing deriveKey usage",0,null,null],["Derived key of type name: HMAC hash: SHA-1 length: 256 using long derivedKey, normal salt, SHA-1, with empty info with wrong (ECDH) key",0,null,null],["Derived key of type name: HMAC hash: SHA-256 length: 256 using long derivedKey, normal salt, SHA-1, with empty info",0,null,null],["Derived key of type name: HMAC hash: SHA-256 length: 256 using long derivedKey, normal salt, SHA-1, with empty info with bad hash name SHA1",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: HMAC hash: SHA-256 length: 256 using long derivedKey, normal salt, SHA-1, with empty info with missing deriveKey usage",0,null,null],["Derived key of type name: HMAC hash: SHA-256 length: 256 using long derivedKey, normal salt, SHA-1, with empty info with wrong (ECDH) key",0,null,null],["Derived key of type name: HMAC hash: SHA-384 length: 256 using long derivedKey, normal salt, SHA-1, with empty info",0,null,null],["Derived key of type name: HMAC hash: SHA-384 length: 256 using long derivedKey, normal salt, SHA-1, with empty info with bad hash name SHA1",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: HMAC hash: SHA-384 length: 256 using long derivedKey, normal salt, SHA-1, with empty info with missing deriveKey usage",0,null,null],["Derived key of type name: HMAC hash: SHA-384 length: 256 using long derivedKey, normal salt, SHA-1, with empty info with wrong (ECDH) key",0,null,null],["Derived key of type name: HMAC hash: SHA-512 length: 256 using long derivedKey, normal salt, SHA-1, with empty info",0,null,null],["Derived key of type name: HMAC hash: SHA-512 length: 256 using long derivedKey, normal salt, SHA-1, with empty info with bad hash name SHA1",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: HMAC hash: SHA-512 length: 256 using long derivedKey, normal salt, SHA-1, with empty info with missing deriveKey usage",0,null,null],["Derived key of type name: HMAC hash: SHA-512 length: 256 using long derivedKey, normal salt, SHA-1, with empty info with wrong (ECDH) key",0,null,null],["long derivedKey, normal salt, SHA-1, with empty info with missing salt",1,"assert_equals: deriveBits missing salt correctly threw OperationError: An invalid or illegal string was specified expected \"TypeError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:128:33\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:124:36\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:123:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["long derivedKey, normal salt, SHA-1, with empty info with missing info",1,"assert_equals: deriveBits missing info correctly threw OperationError: An invalid or illegal string was specified expected \"TypeError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:138:33\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:134:36\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:133:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["long derivedKey, normal salt, SHA-1, with empty info with null length",1,"assert_equals: deriveBits with null length correctly threw OperationError: Data provided to an operation does not meet requirements expected \"TypeError\" but got \"DataError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:148:33\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:144:36\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:143:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["long derivedKey, normal salt, SHA-1, with empty info with non-multiple of 8 length",1,"assert_unreached: non-multiple of 8 length should have thrown an OperationError Reached unreachable code","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:156:33\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:154:36\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:153:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["long derivedKey, normal salt, SHA-1, with empty info with bad hash name SHA1",1,"assert_equals: deriveBits with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:170:33\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:166:36\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:164:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["long derivedKey, normal salt, SHA-1, with empty info with missing deriveBits usage",0,null,null],["long derivedKey, normal salt, SHA-1, with empty info with wrong (ECDH) key",0,null,null],["long derivedKey, normal salt, SHA-256, with normal info",0,null,null],["long derivedKey, normal salt, SHA-256, with normal info with 0 length",1,"assert_equals: deriveBits with 0 length correctly threw OperationError: Data provided to an operation does not meet requirements expected \"OperationError\" but got \"DataError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:54:33\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:50:36\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:49:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-CBC length: 128 using long derivedKey, normal salt, SHA-256, with normal info",0,null,null],["Derived key of type name: AES-CBC length: 128 using long derivedKey, normal salt, SHA-256, with normal info with bad hash name SHA256",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-CBC length: 128 using long derivedKey, normal salt, SHA-256, with normal info with missing deriveKey usage",0,null,null],["Derived key of type name: AES-CBC length: 128 using long derivedKey, normal salt, SHA-256, with normal info with wrong (ECDH) key",0,null,null],["Derived key of type name: AES-CBC length: 192 using long derivedKey, normal salt, SHA-256, with normal info",0,null,null],["Derived key of type name: AES-CBC length: 192 using long derivedKey, normal salt, SHA-256, with normal info with bad hash name SHA256",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-CBC length: 192 using long derivedKey, normal salt, SHA-256, with normal info with missing deriveKey usage",0,null,null],["Derived key of type name: AES-CBC length: 192 using long derivedKey, normal salt, SHA-256, with normal info with wrong (ECDH) key",0,null,null],["Derived key of type name: AES-CBC length: 256 using long derivedKey, normal salt, SHA-256, with normal info",0,null,null],["Derived key of type name: AES-CBC length: 256 using long derivedKey, normal salt, SHA-256, with normal info with bad hash name SHA256",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-CBC length: 256 using long derivedKey, normal salt, SHA-256, with normal info with missing deriveKey usage",0,null,null],["Derived key of type name: AES-CBC length: 256 using long derivedKey, normal salt, SHA-256, with normal info with wrong (ECDH) key",0,null,null],["Derived key of type name: AES-CTR length: 128 using long derivedKey, normal salt, SHA-256, with normal info",0,null,null],["Derived key of type name: AES-CTR length: 128 using long derivedKey, normal salt, SHA-256, with normal info with bad hash name SHA256",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-CTR length: 128 using long derivedKey, normal salt, SHA-256, with normal info with missing deriveKey usage",0,null,null],["Derived key of type name: AES-CTR length: 128 using long derivedKey, normal salt, SHA-256, with normal info with wrong (ECDH) key",0,null,null],["Derived key of type name: AES-CTR length: 192 using long derivedKey, normal salt, SHA-256, with normal info",0,null,null],["Derived key of type name: AES-CTR length: 192 using long derivedKey, normal salt, SHA-256, with normal info with bad hash name SHA256",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-CTR length: 192 using long derivedKey, normal salt, SHA-256, with normal info with missing deriveKey usage",0,null,null],["Derived key of type name: AES-CTR length: 192 using long derivedKey, normal salt, SHA-256, with normal info with wrong (ECDH) key",0,null,null],["Derived key of type name: AES-CTR length: 256 using long derivedKey, normal salt, SHA-256, with normal info",0,null,null],["Derived key of type name: AES-CTR length: 256 using long derivedKey, normal salt, SHA-256, with normal info with bad hash name SHA256",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-CTR length: 256 using long derivedKey, normal salt, SHA-256, with normal info with missing deriveKey usage",0,null,null],["Derived key of type name: AES-CTR length: 256 using long derivedKey, normal salt, SHA-256, with normal info with wrong (ECDH) key",0,null,null],["Derived key of type name: AES-GCM length: 128 using long derivedKey, normal salt, SHA-256, with normal info",0,null,null],["Derived key of type name: AES-GCM length: 128 using long derivedKey, normal salt, SHA-256, with normal info with bad hash name SHA256",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-GCM length: 128 using long derivedKey, normal salt, SHA-256, with normal info with missing deriveKey usage",0,null,null],["Derived key of type name: AES-GCM length: 128 using long derivedKey, normal salt, SHA-256, with normal info with wrong (ECDH) key",0,null,null],["Derived key of type name: AES-GCM length: 192 using long derivedKey, normal salt, SHA-256, with normal info",0,null,null],["Derived key of type name: AES-GCM length: 192 using long derivedKey, normal salt, SHA-256, with normal info with bad hash name SHA256",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-GCM length: 192 using long derivedKey, normal salt, SHA-256, with normal info with missing deriveKey usage",0,null,null],["Derived key of type name: AES-GCM length: 192 using long derivedKey, normal salt, SHA-256, with normal info with wrong (ECDH) key",0,null,null],["Derived key of type name: AES-GCM length: 256 using long derivedKey, normal salt, SHA-256, with normal info",0,null,null],["Derived key of type name: AES-GCM length: 256 using long derivedKey, normal salt, SHA-256, with normal info with bad hash name SHA256",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-GCM length: 256 using long derivedKey, normal salt, SHA-256, with normal info with missing deriveKey usage",0,null,null],["Derived key of type name: AES-GCM length: 256 using long derivedKey, normal salt, SHA-256, with normal info with wrong (ECDH) key",0,null,null],["Derived key of type name: AES-KW length: 128 using long derivedKey, normal salt, SHA-256, with normal info",0,null,null],["Derived key of type name: AES-KW length: 128 using long derivedKey, normal salt, SHA-256, with normal info with bad hash name SHA256",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-KW length: 128 using long derivedKey, normal salt, SHA-256, with normal info with missing deriveKey usage",0,null,null],["Derived key of type name: AES-KW length: 128 using long derivedKey, normal salt, SHA-256, with normal info with wrong (ECDH) key",0,null,null],["Derived key of type name: AES-KW length: 192 using long derivedKey, normal salt, SHA-256, with normal info",0,null,null],["Derived key of type name: AES-KW length: 192 using long derivedKey, normal salt, SHA-256, with normal info with bad hash name SHA256",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-KW length: 192 using long derivedKey, normal salt, SHA-256, with normal info with missing deriveKey usage",0,null,null],["Derived key of type name: AES-KW length: 192 using long derivedKey, normal salt, SHA-256, with normal info with wrong (ECDH) key",0,null,null],["Derived key of type name: AES-KW length: 256 using long derivedKey, normal salt, SHA-256, with normal info",0,null,null],["Derived key of type name: AES-KW length: 256 using long derivedKey, normal salt, SHA-256, with normal info with bad hash name SHA256",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-KW length: 256 using long derivedKey, normal salt, SHA-256, with normal info with missing deriveKey usage",0,null,null],["Derived key of type name: AES-KW length: 256 using long derivedKey, normal salt, SHA-256, with normal info with wrong (ECDH) key",0,null,null],["Derived key of type name: HMAC hash: SHA-1 length: 256 using long derivedKey, normal salt, SHA-256, with normal info",0,null,null],["Derived key of type name: HMAC hash: SHA-1 length: 256 using long derivedKey, normal salt, SHA-256, with normal info with bad hash name SHA256",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: HMAC hash: SHA-1 length: 256 using long derivedKey, normal salt, SHA-256, with normal info with missing deriveKey usage",0,null,null],["Derived key of type name: HMAC hash: SHA-1 length: 256 using long derivedKey, normal salt, SHA-256, with normal info with wrong (ECDH) key",0,null,null],["Derived key of type name: HMAC hash: SHA-256 length: 256 using long derivedKey, normal salt, SHA-256, with normal info",0,null,null],["Derived key of type name: HMAC hash: SHA-256 length: 256 using long derivedKey, normal salt, SHA-256, with normal info with bad hash name SHA256",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: HMAC hash: SHA-256 length: 256 using long derivedKey, normal salt, SHA-256, with normal info with missing deriveKey usage",0,null,null],["Derived key of type name: HMAC hash: SHA-256 length: 256 using long derivedKey, normal salt, SHA-256, with normal info with wrong (ECDH) key",0,null,null],["Derived key of type name: HMAC hash: SHA-384 length: 256 using long derivedKey, normal salt, SHA-256, with normal info",0,null,null],["Derived key of type name: HMAC hash: SHA-384 length: 256 using long derivedKey, normal salt, SHA-256, with normal info with bad hash name SHA256",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: HMAC hash: SHA-384 length: 256 using long derivedKey, normal salt, SHA-256, with normal info with missing deriveKey usage",0,null,null],["Derived key of type name: HMAC hash: SHA-384 length: 256 using long derivedKey, normal salt, SHA-256, with normal info with wrong (ECDH) key",0,null,null],["Derived key of type name: HMAC hash: SHA-512 length: 256 using long derivedKey, normal salt, SHA-256, with normal info",0,null,null],["Derived key of type name: HMAC hash: SHA-512 length: 256 using long derivedKey, normal salt, SHA-256, with normal info with bad hash name SHA256",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: HMAC hash: SHA-512 length: 256 using long derivedKey, normal salt, SHA-256, with normal info with missing deriveKey usage",0,null,null],["Derived key of type name: HMAC hash: SHA-512 length: 256 using long derivedKey, normal salt, SHA-256, with normal info with wrong (ECDH) key",0,null,null],["long derivedKey, normal salt, SHA-256, with normal info with missing salt",1,"assert_equals: deriveBits missing salt correctly threw OperationError: An invalid or illegal string was specified expected \"TypeError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:128:33\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:124:36\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:123:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["long derivedKey, normal salt, SHA-256, with normal info with missing info",1,"assert_equals: deriveBits missing info correctly threw OperationError: An invalid or illegal string was specified expected \"TypeError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:138:33\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:134:36\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:133:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["long derivedKey, normal salt, SHA-256, with normal info with null length",1,"assert_equals: deriveBits with null length correctly threw OperationError: Data provided to an operation does not meet requirements expected \"TypeError\" but got \"DataError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:148:33\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:144:36\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:143:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["long derivedKey, normal salt, SHA-256, with normal info with non-multiple of 8 length",1,"assert_unreached: non-multiple of 8 length should have thrown an OperationError Reached unreachable code","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:156:33\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:154:36\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:153:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["long derivedKey, normal salt, SHA-256, with normal info with bad hash name SHA256",1,"assert_equals: deriveBits with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:170:33\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:166:36\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:164:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["long derivedKey, normal salt, SHA-256, with normal info with missing deriveBits usage",0,null,null],["long derivedKey, normal salt, SHA-256, with normal info with wrong (ECDH) key",0,null,null],["long derivedKey, normal salt, SHA-256, with empty info",0,null,null],["long derivedKey, normal salt, SHA-256, with empty info with 0 length",1,"assert_equals: deriveBits with 0 length correctly threw OperationError: Data provided to an operation does not meet requirements expected \"OperationError\" but got \"DataError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:54:33\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:50:36\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:49:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-CBC length: 128 using long derivedKey, normal salt, SHA-256, with empty info",0,null,null],["Derived key of type name: AES-CBC length: 128 using long derivedKey, normal salt, SHA-256, with empty info with bad hash name SHA256",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-CBC length: 128 using long derivedKey, normal salt, SHA-256, with empty info with missing deriveKey usage",0,null,null],["Derived key of type name: AES-CBC length: 128 using long derivedKey, normal salt, SHA-256, with empty info with wrong (ECDH) key",0,null,null],["Derived key of type name: AES-CBC length: 192 using long derivedKey, normal salt, SHA-256, with empty info",0,null,null],["Derived key of type name: AES-CBC length: 192 using long derivedKey, normal salt, SHA-256, with empty info with bad hash name SHA256",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-CBC length: 192 using long derivedKey, normal salt, SHA-256, with empty info with missing deriveKey usage",0,null,null],["Derived key of type name: AES-CBC length: 192 using long derivedKey, normal salt, SHA-256, with empty info with wrong (ECDH) key",0,null,null],["Derived key of type name: AES-CBC length: 256 using long derivedKey, normal salt, SHA-256, with empty info",0,null,null],["Derived key of type name: AES-CBC length: 256 using long derivedKey, normal salt, SHA-256, with empty info with bad hash name SHA256",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-CBC length: 256 using long derivedKey, normal salt, SHA-256, with empty info with missing deriveKey usage",0,null,null],["Derived key of type name: AES-CBC length: 256 using long derivedKey, normal salt, SHA-256, with empty info with wrong (ECDH) key",0,null,null],["Derived key of type name: AES-CTR length: 128 using long derivedKey, normal salt, SHA-256, with empty info",0,null,null],["Derived key of type name: AES-CTR length: 128 using long derivedKey, normal salt, SHA-256, with empty info with bad hash name SHA256",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-CTR length: 128 using long derivedKey, normal salt, SHA-256, with empty info with missing deriveKey usage",0,null,null],["Derived key of type name: AES-CTR length: 128 using long derivedKey, normal salt, SHA-256, with empty info with wrong (ECDH) key",0,null,null],["Derived key of type name: AES-CTR length: 192 using long derivedKey, normal salt, SHA-256, with empty info",0,null,null],["Derived key of type name: AES-CTR length: 192 using long derivedKey, normal salt, SHA-256, with empty info with bad hash name SHA256",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-CTR length: 192 using long derivedKey, normal salt, SHA-256, with empty info with missing deriveKey usage",0,null,null],["Derived key of type name: AES-CTR length: 192 using long derivedKey, normal salt, SHA-256, with empty info with wrong (ECDH) key",0,null,null],["Derived key of type name: AES-CTR length: 256 using long derivedKey, normal salt, SHA-256, with empty info",0,null,null],["Derived key of type name: AES-CTR length: 256 using long derivedKey, normal salt, SHA-256, with empty info with bad hash name SHA256",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-CTR length: 256 using long derivedKey, normal salt, SHA-256, with empty info with missing deriveKey usage",0,null,null],["Derived key of type name: AES-CTR length: 256 using long derivedKey, normal salt, SHA-256, with empty info with wrong (ECDH) key",0,null,null],["Derived key of type name: AES-GCM length: 128 using long derivedKey, normal salt, SHA-256, with empty info",0,null,null],["Derived key of type name: AES-GCM length: 128 using long derivedKey, normal salt, SHA-256, with empty info with bad hash name SHA256",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-GCM length: 128 using long derivedKey, normal salt, SHA-256, with empty info with missing deriveKey usage",0,null,null],["Derived key of type name: AES-GCM length: 128 using long derivedKey, normal salt, SHA-256, with empty info with wrong (ECDH) key",0,null,null],["Derived key of type name: AES-GCM length: 192 using long derivedKey, normal salt, SHA-256, with empty info",0,null,null],["Derived key of type name: AES-GCM length: 192 using long derivedKey, normal salt, SHA-256, with empty info with bad hash name SHA256",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-GCM length: 192 using long derivedKey, normal salt, SHA-256, with empty info with missing deriveKey usage",0,null,null],["Derived key of type name: AES-GCM length: 192 using long derivedKey, normal salt, SHA-256, with empty info with wrong (ECDH) key",0,null,null],["Derived key of type name: AES-GCM length: 256 using long derivedKey, normal salt, SHA-256, with empty info",0,null,null],["Derived key of type name: AES-GCM length: 256 using long derivedKey, normal salt, SHA-256, with empty info with bad hash name SHA256",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-GCM length: 256 using long derivedKey, normal salt, SHA-256, with empty info with missing deriveKey usage",0,null,null],["Derived key of type name: AES-GCM length: 256 using long derivedKey, normal salt, SHA-256, with empty info with wrong (ECDH) key",0,null,null],["Derived key of type name: AES-KW length: 128 using long derivedKey, normal salt, SHA-256, with empty info",0,null,null],["Derived key of type name: AES-KW length: 128 using long derivedKey, normal salt, SHA-256, with empty info with bad hash name SHA256",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-KW length: 128 using long derivedKey, normal salt, SHA-256, with empty info with missing deriveKey usage",0,null,null],["Derived key of type name: AES-KW length: 128 using long derivedKey, normal salt, SHA-256, with empty info with wrong (ECDH) key",0,null,null],["Derived key of type name: AES-KW length: 192 using long derivedKey, normal salt, SHA-256, with empty info",0,null,null],["Derived key of type name: AES-KW length: 192 using long derivedKey, normal salt, SHA-256, with empty info with bad hash name SHA256",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-KW length: 192 using long derivedKey, normal salt, SHA-256, with empty info with missing deriveKey usage",0,null,null],["Derived key of type name: AES-KW length: 192 using long derivedKey, normal salt, SHA-256, with empty info with wrong (ECDH) key",0,null,null],["Derived key of type name: AES-KW length: 256 using long derivedKey, normal salt, SHA-256, with empty info",0,null,null],["Derived key of type name: AES-KW length: 256 using long derivedKey, normal salt, SHA-256, with empty info with bad hash name SHA256",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-KW length: 256 using long derivedKey, normal salt, SHA-256, with empty info with missing deriveKey usage",0,null,null],["Derived key of type name: AES-KW length: 256 using long derivedKey, normal salt, SHA-256, with empty info with wrong (ECDH) key",0,null,null],["Derived key of type name: HMAC hash: SHA-1 length: 256 using long derivedKey, normal salt, SHA-256, with empty info",0,null,null],["Derived key of type name: HMAC hash: SHA-1 length: 256 using long derivedKey, normal salt, SHA-256, with empty info with bad hash name SHA256",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: HMAC hash: SHA-1 length: 256 using long derivedKey, normal salt, SHA-256, with empty info with missing deriveKey usage",0,null,null],["Derived key of type name: HMAC hash: SHA-1 length: 256 using long derivedKey, normal salt, SHA-256, with empty info with wrong (ECDH) key",0,null,null],["Derived key of type name: HMAC hash: SHA-256 length: 256 using long derivedKey, normal salt, SHA-256, with empty info",0,null,null],["Derived key of type name: HMAC hash: SHA-256 length: 256 using long derivedKey, normal salt, SHA-256, with empty info with bad hash name SHA256",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: HMAC hash: SHA-256 length: 256 using long derivedKey, normal salt, SHA-256, with empty info with missing deriveKey usage",0,null,null],["Derived key of type name: HMAC hash: SHA-256 length: 256 using long derivedKey, normal salt, SHA-256, with empty info with wrong (ECDH) key",0,null,null],["Derived key of type name: HMAC hash: SHA-384 length: 256 using long derivedKey, normal salt, SHA-256, with empty info",0,null,null],["Derived key of type name: HMAC hash: SHA-384 length: 256 using long derivedKey, normal salt, SHA-256, with empty info with bad hash name SHA256",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: HMAC hash: SHA-384 length: 256 using long derivedKey, normal salt, SHA-256, with empty info with missing deriveKey usage",0,null,null],["Derived key of type name: HMAC hash: SHA-384 length: 256 using long derivedKey, normal salt, SHA-256, with empty info with wrong (ECDH) key",0,null,null],["Derived key of type name: HMAC hash: SHA-512 length: 256 using long derivedKey, normal salt, SHA-256, with empty info",0,null,null],["Derived key of type name: HMAC hash: SHA-512 length: 256 using long derivedKey, normal salt, SHA-256, with empty info with bad hash name SHA256",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: HMAC hash: SHA-512 length: 256 using long derivedKey, normal salt, SHA-256, with empty info with missing deriveKey usage",0,null,null],["Derived key of type name: HMAC hash: SHA-512 length: 256 using long derivedKey, normal salt, SHA-256, with empty info with wrong (ECDH) key",0,null,null],["long derivedKey, normal salt, SHA-256, with empty info with missing salt",1,"assert_equals: deriveBits missing salt correctly threw OperationError: An invalid or illegal string was specified expected \"TypeError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:128:33\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:124:36\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:123:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["long derivedKey, normal salt, SHA-256, with empty info with missing info",1,"assert_equals: deriveBits missing info correctly threw OperationError: An invalid or illegal string was specified expected \"TypeError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:138:33\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:134:36\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:133:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["long derivedKey, normal salt, SHA-256, with empty info with null length",1,"assert_equals: deriveBits with null length correctly threw OperationError: Data provided to an operation does not meet requirements expected \"TypeError\" but got \"DataError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:148:33\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:144:36\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:143:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["long derivedKey, normal salt, SHA-256, with empty info with non-multiple of 8 length",1,"assert_unreached: non-multiple of 8 length should have thrown an OperationError Reached unreachable code","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:156:33\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:154:36\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:153:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["long derivedKey, normal salt, SHA-256, with empty info with bad hash name SHA256",1,"assert_equals: deriveBits with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:170:33\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:166:36\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:164:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["long derivedKey, normal salt, SHA-256, with empty info with missing deriveBits usage",0,null,null],["long derivedKey, normal salt, SHA-256, with empty info with wrong (ECDH) key",0,null,null],["long derivedKey, normal salt, PBKDF2, with normal info with non-digest algorithm PBKDF2",0,null,null],["Derived key of type name: AES-CBC length: 128 using long derivedKey, normal salt, PBKDF2, with normal info",0,null,null],["Derived key of type name: AES-CBC length: 192 using long derivedKey, normal salt, PBKDF2, with normal info",0,null,null],["Derived key of type name: AES-CBC length: 256 using long derivedKey, normal salt, PBKDF2, with normal info",0,null,null],["Derived key of type name: AES-CTR length: 128 using long derivedKey, normal salt, PBKDF2, with normal info",0,null,null],["Derived key of type name: AES-CTR length: 192 using long derivedKey, normal salt, PBKDF2, with normal info",0,null,null],["Derived key of type name: AES-CTR length: 256 using long derivedKey, normal salt, PBKDF2, with normal info",0,null,null],["Derived key of type name: AES-GCM length: 128 using long derivedKey, normal salt, PBKDF2, with normal info",0,null,null],["Derived key of type name: AES-GCM length: 192 using long derivedKey, normal salt, PBKDF2, with normal info",0,null,null],["Derived key of type name: AES-GCM length: 256 using long derivedKey, normal salt, PBKDF2, with normal info",0,null,null],["Derived key of type name: AES-KW length: 128 using long derivedKey, normal salt, PBKDF2, with normal info",0,null,null],["Derived key of type name: AES-KW length: 192 using long derivedKey, normal salt, PBKDF2, with normal info",0,null,null],["Derived key of type name: AES-KW length: 256 using long derivedKey, normal salt, PBKDF2, with normal info",0,null,null],["Derived key of type name: HMAC hash: SHA-1 length: 256 using long derivedKey, normal salt, PBKDF2, with normal info",0,null,null],["Derived key of type name: HMAC hash: SHA-256 length: 256 using long derivedKey, normal salt, PBKDF2, with normal info",0,null,null],["Derived key of type name: HMAC hash: SHA-384 length: 256 using long derivedKey, normal salt, PBKDF2, with normal info",0,null,null],["Derived key of type name: HMAC hash: SHA-512 length: 256 using long derivedKey, normal salt, PBKDF2, with normal info",0,null,null],["long derivedKey, normal salt, PBKDF2, with empty info with non-digest algorithm PBKDF2",0,null,null],["Derived key of type name: AES-CBC length: 128 using long derivedKey, normal salt, PBKDF2, with empty info",0,null,null],["Derived key of type name: AES-CBC length: 192 using long derivedKey, normal salt, PBKDF2, with empty info",0,null,null],["Derived key of type name: AES-CBC length: 256 using long derivedKey, normal salt, PBKDF2, with empty info",0,null,null],["Derived key of type name: AES-CTR length: 128 using long derivedKey, normal salt, PBKDF2, with empty info",0,null,null],["Derived key of type name: AES-CTR length: 192 using long derivedKey, normal salt, PBKDF2, with empty info",0,null,null],["Derived key of type name: AES-CTR length: 256 using long derivedKey, normal salt, PBKDF2, with empty info",0,null,null],["Derived key of type name: AES-GCM length: 128 using long derivedKey, normal salt, PBKDF2, with empty info",0,null,null],["Derived key of type name: AES-GCM length: 192 using long derivedKey, normal salt, PBKDF2, with empty info",0,null,null],["Derived key of type name: AES-GCM length: 256 using long derivedKey, normal salt, PBKDF2, with empty info",0,null,null],["Derived key of type name: AES-KW length: 128 using long derivedKey, normal salt, PBKDF2, with empty info",0,null,null],["Derived key of type name: AES-KW length: 192 using long derivedKey, normal salt, PBKDF2, with empty info",0,null,null],["Derived key of type name: AES-KW length: 256 using long derivedKey, normal salt, PBKDF2, with empty info",0,null,null],["Derived key of type name: HMAC hash: SHA-1 length: 256 using long derivedKey, normal salt, PBKDF2, with empty info",0,null,null],["Derived key of type name: HMAC hash: SHA-256 length: 256 using long derivedKey, normal salt, PBKDF2, with empty info",0,null,null],["Derived key of type name: HMAC hash: SHA-384 length: 256 using long derivedKey, normal salt, PBKDF2, with empty info",0,null,null],["Derived key of type name: HMAC hash: SHA-512 length: 256 using long derivedKey, normal salt, PBKDF2, with empty info",0,null,null],["long derivedKey, empty salt, SHA-384, with normal info",0,null,null],["long derivedKey, empty salt, SHA-384, with normal info with 0 length",1,"assert_equals: deriveBits with 0 length correctly threw OperationError: Data provided to an operation does not meet requirements expected \"OperationError\" but got \"DataError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:54:33\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:50:36\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:49:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-CBC length: 128 using long derivedKey, empty salt, SHA-384, with normal info",0,null,null],["Derived key of type name: AES-CBC length: 128 using long derivedKey, empty salt, SHA-384, with normal info with bad hash name SHA384",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-CBC length: 128 using long derivedKey, empty salt, SHA-384, with normal info with missing deriveKey usage",0,null,null],["Derived key of type name: AES-CBC length: 128 using long derivedKey, empty salt, SHA-384, with normal info with wrong (ECDH) key",0,null,null],["Derived key of type name: AES-CBC length: 192 using long derivedKey, empty salt, SHA-384, with normal info",0,null,null],["Derived key of type name: AES-CBC length: 192 using long derivedKey, empty salt, SHA-384, with normal info with bad hash name SHA384",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-CBC length: 192 using long derivedKey, empty salt, SHA-384, with normal info with missing deriveKey usage",0,null,null],["Derived key of type name: AES-CBC length: 192 using long derivedKey, empty salt, SHA-384, with normal info with wrong (ECDH) key",0,null,null],["Derived key of type name: AES-CBC length: 256 using long derivedKey, empty salt, SHA-384, with normal info",0,null,null],["Derived key of type name: AES-CBC length: 256 using long derivedKey, empty salt, SHA-384, with normal info with bad hash name SHA384",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-CBC length: 256 using long derivedKey, empty salt, SHA-384, with normal info with missing deriveKey usage",0,null,null],["Derived key of type name: AES-CBC length: 256 using long derivedKey, empty salt, SHA-384, with normal info with wrong (ECDH) key",0,null,null],["Derived key of type name: AES-CTR length: 128 using long derivedKey, empty salt, SHA-384, with normal info",0,null,null],["Derived key of type name: AES-CTR length: 128 using long derivedKey, empty salt, SHA-384, with normal info with bad hash name SHA384",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-CTR length: 128 using long derivedKey, empty salt, SHA-384, with normal info with missing deriveKey usage",0,null,null],["Derived key of type name: AES-CTR length: 128 using long derivedKey, empty salt, SHA-384, with normal info with wrong (ECDH) key",0,null,null],["Derived key of type name: AES-CTR length: 192 using long derivedKey, empty salt, SHA-384, with normal info",0,null,null],["Derived key of type name: AES-CTR length: 192 using long derivedKey, empty salt, SHA-384, with normal info with bad hash name SHA384",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-CTR length: 192 using long derivedKey, empty salt, SHA-384, with normal info with missing deriveKey usage",0,null,null],["Derived key of type name: AES-CTR length: 192 using long derivedKey, empty salt, SHA-384, with normal info with wrong (ECDH) key",0,null,null],["Derived key of type name: AES-CTR length: 256 using long derivedKey, empty salt, SHA-384, with normal info",0,null,null],["Derived key of type name: AES-CTR length: 256 using long derivedKey, empty salt, SHA-384, with normal info with bad hash name SHA384",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-CTR length: 256 using long derivedKey, empty salt, SHA-384, with normal info with missing deriveKey usage",0,null,null],["Derived key of type name: AES-CTR length: 256 using long derivedKey, empty salt, SHA-384, with normal info with wrong (ECDH) key",0,null,null],["Derived key of type name: AES-GCM length: 128 using long derivedKey, empty salt, SHA-384, with normal info",0,null,null],["Derived key of type name: AES-GCM length: 128 using long derivedKey, empty salt, SHA-384, with normal info with bad hash name SHA384",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-GCM length: 128 using long derivedKey, empty salt, SHA-384, with normal info with missing deriveKey usage",0,null,null],["Derived key of type name: AES-GCM length: 128 using long derivedKey, empty salt, SHA-384, with normal info with wrong (ECDH) key",0,null,null],["Derived key of type name: AES-GCM length: 192 using long derivedKey, empty salt, SHA-384, with normal info",0,null,null],["Derived key of type name: AES-GCM length: 192 using long derivedKey, empty salt, SHA-384, with normal info with bad hash name SHA384",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-GCM length: 192 using long derivedKey, empty salt, SHA-384, with normal info with missing deriveKey usage",0,null,null],["Derived key of type name: AES-GCM length: 192 using long derivedKey, empty salt, SHA-384, with normal info with wrong (ECDH) key",0,null,null],["Derived key of type name: AES-GCM length: 256 using long derivedKey, empty salt, SHA-384, with normal info",0,null,null],["Derived key of type name: AES-GCM length: 256 using long derivedKey, empty salt, SHA-384, with normal info with bad hash name SHA384",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-GCM length: 256 using long derivedKey, empty salt, SHA-384, with normal info with missing deriveKey usage",0,null,null],["Derived key of type name: AES-GCM length: 256 using long derivedKey, empty salt, SHA-384, with normal info with wrong (ECDH) key",0,null,null],["Derived key of type name: AES-KW length: 128 using long derivedKey, empty salt, SHA-384, with normal info",0,null,null],["Derived key of type name: AES-KW length: 128 using long derivedKey, empty salt, SHA-384, with normal info with bad hash name SHA384",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-KW length: 128 using long derivedKey, empty salt, SHA-384, with normal info with missing deriveKey usage",0,null,null],["Derived key of type name: AES-KW length: 128 using long derivedKey, empty salt, SHA-384, with normal info with wrong (ECDH) key",0,null,null],["Derived key of type name: AES-KW length: 192 using long derivedKey, empty salt, SHA-384, with normal info",0,null,null],["Derived key of type name: AES-KW length: 192 using long derivedKey, empty salt, SHA-384, with normal info with bad hash name SHA384",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-KW length: 192 using long derivedKey, empty salt, SHA-384, with normal info with missing deriveKey usage",0,null,null],["Derived key of type name: AES-KW length: 192 using long derivedKey, empty salt, SHA-384, with normal info with wrong (ECDH) key",0,null,null],["Derived key of type name: AES-KW length: 256 using long derivedKey, empty salt, SHA-384, with normal info",0,null,null],["Derived key of type name: AES-KW length: 256 using long derivedKey, empty salt, SHA-384, with normal info with bad hash name SHA384",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-KW length: 256 using long derivedKey, empty salt, SHA-384, with normal info with missing deriveKey usage",0,null,null],["Derived key of type name: AES-KW length: 256 using long derivedKey, empty salt, SHA-384, with normal info with wrong (ECDH) key",0,null,null],["Derived key of type name: HMAC hash: SHA-1 length: 256 using long derivedKey, empty salt, SHA-384, with normal info",0,null,null],["Derived key of type name: HMAC hash: SHA-1 length: 256 using long derivedKey, empty salt, SHA-384, with normal info with bad hash name SHA384",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: HMAC hash: SHA-1 length: 256 using long derivedKey, empty salt, SHA-384, with normal info with missing deriveKey usage",0,null,null],["Derived key of type name: HMAC hash: SHA-1 length: 256 using long derivedKey, empty salt, SHA-384, with normal info with wrong (ECDH) key",0,null,null],["Derived key of type name: HMAC hash: SHA-256 length: 256 using long derivedKey, empty salt, SHA-384, with normal info",0,null,null],["Derived key of type name: HMAC hash: SHA-256 length: 256 using long derivedKey, empty salt, SHA-384, with normal info with bad hash name SHA384",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: HMAC hash: SHA-256 length: 256 using long derivedKey, empty salt, SHA-384, with normal info with missing deriveKey usage",0,null,null],["Derived key of type name: HMAC hash: SHA-256 length: 256 using long derivedKey, empty salt, SHA-384, with normal info with wrong (ECDH) key",0,null,null],["Derived key of type name: HMAC hash: SHA-384 length: 256 using long derivedKey, empty salt, SHA-384, with normal info",0,null,null],["Derived key of type name: HMAC hash: SHA-384 length: 256 using long derivedKey, empty salt, SHA-384, with normal info with bad hash name SHA384",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: HMAC hash: SHA-384 length: 256 using long derivedKey, empty salt, SHA-384, with normal info with missing deriveKey usage",0,null,null],["Derived key of type name: HMAC hash: SHA-384 length: 256 using long derivedKey, empty salt, SHA-384, with normal info with wrong (ECDH) key",0,null,null],["Derived key of type name: HMAC hash: SHA-512 length: 256 using long derivedKey, empty salt, SHA-384, with normal info",0,null,null],["Derived key of type name: HMAC hash: SHA-512 length: 256 using long derivedKey, empty salt, SHA-384, with normal info with bad hash name SHA384",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: HMAC hash: SHA-512 length: 256 using long derivedKey, empty salt, SHA-384, with normal info with missing deriveKey usage",0,null,null],["Derived key of type name: HMAC hash: SHA-512 length: 256 using long derivedKey, empty salt, SHA-384, with normal info with wrong (ECDH) key",0,null,null],["long derivedKey, empty salt, SHA-384, with normal info with missing salt",1,"assert_equals: deriveBits missing salt correctly threw OperationError: An invalid or illegal string was specified expected \"TypeError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:128:33\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:124:36\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:123:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["long derivedKey, empty salt, SHA-384, with normal info with missing info",1,"assert_equals: deriveBits missing info correctly threw OperationError: An invalid or illegal string was specified expected \"TypeError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:138:33\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:134:36\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:133:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["long derivedKey, empty salt, SHA-384, with normal info with null length",1,"assert_equals: deriveBits with null length correctly threw OperationError: Data provided to an operation does not meet requirements expected \"TypeError\" but got \"DataError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:148:33\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:144:36\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:143:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["long derivedKey, empty salt, SHA-384, with normal info with non-multiple of 8 length",1,"assert_unreached: non-multiple of 8 length should have thrown an OperationError Reached unreachable code","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:156:33\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:154:36\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:153:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["long derivedKey, empty salt, SHA-384, with normal info with bad hash name SHA384",1,"assert_equals: deriveBits with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:170:33\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:166:36\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:164:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["long derivedKey, empty salt, SHA-384, with normal info with missing deriveBits usage",0,null,null],["long derivedKey, empty salt, SHA-384, with normal info with wrong (ECDH) key",0,null,null],["long derivedKey, empty salt, SHA-384, with empty info",0,null,null],["long derivedKey, empty salt, SHA-384, with empty info with 0 length",1,"assert_equals: deriveBits with 0 length correctly threw OperationError: Data provided to an operation does not meet requirements expected \"OperationError\" but got \"DataError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:54:33\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:50:36\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:49:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-CBC length: 128 using long derivedKey, empty salt, SHA-384, with empty info",0,null,null],["Derived key of type name: AES-CBC length: 128 using long derivedKey, empty salt, SHA-384, with empty info with bad hash name SHA384",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-CBC length: 128 using long derivedKey, empty salt, SHA-384, with empty info with missing deriveKey usage",0,null,null],["Derived key of type name: AES-CBC length: 128 using long derivedKey, empty salt, SHA-384, with empty info with wrong (ECDH) key",0,null,null],["Derived key of type name: AES-CBC length: 192 using long derivedKey, empty salt, SHA-384, with empty info",0,null,null],["Derived key of type name: AES-CBC length: 192 using long derivedKey, empty salt, SHA-384, with empty info with bad hash name SHA384",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-CBC length: 192 using long derivedKey, empty salt, SHA-384, with empty info with missing deriveKey usage",0,null,null],["Derived key of type name: AES-CBC length: 192 using long derivedKey, empty salt, SHA-384, with empty info with wrong (ECDH) key",0,null,null],["Derived key of type name: AES-CBC length: 256 using long derivedKey, empty salt, SHA-384, with empty info",0,null,null],["Derived key of type name: AES-CBC length: 256 using long derivedKey, empty salt, SHA-384, with empty info with bad hash name SHA384",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-CBC length: 256 using long derivedKey, empty salt, SHA-384, with empty info with missing deriveKey usage",0,null,null],["Derived key of type name: AES-CBC length: 256 using long derivedKey, empty salt, SHA-384, with empty info with wrong (ECDH) key",0,null,null],["Derived key of type name: AES-CTR length: 128 using long derivedKey, empty salt, SHA-384, with empty info",0,null,null],["Derived key of type name: AES-CTR length: 128 using long derivedKey, empty salt, SHA-384, with empty info with bad hash name SHA384",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-CTR length: 128 using long derivedKey, empty salt, SHA-384, with empty info with missing deriveKey usage",0,null,null],["Derived key of type name: AES-CTR length: 128 using long derivedKey, empty salt, SHA-384, with empty info with wrong (ECDH) key",0,null,null],["Derived key of type name: AES-CTR length: 192 using long derivedKey, empty salt, SHA-384, with empty info",0,null,null],["Derived key of type name: AES-CTR length: 192 using long derivedKey, empty salt, SHA-384, with empty info with bad hash name SHA384",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-CTR length: 192 using long derivedKey, empty salt, SHA-384, with empty info with missing deriveKey usage",0,null,null],["Derived key of type name: AES-CTR length: 192 using long derivedKey, empty salt, SHA-384, with empty info with wrong (ECDH) key",0,null,null],["Derived key of type name: AES-CTR length: 256 using long derivedKey, empty salt, SHA-384, with empty info",0,null,null],["Derived key of type name: AES-CTR length: 256 using long derivedKey, empty salt, SHA-384, with empty info with bad hash name SHA384",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-CTR length: 256 using long derivedKey, empty salt, SHA-384, with empty info with missing deriveKey usage",0,null,null],["Derived key of type name: AES-CTR length: 256 using long derivedKey, empty salt, SHA-384, with empty info with wrong (ECDH) key",0,null,null],["Derived key of type name: AES-GCM length: 128 using long derivedKey, empty salt, SHA-384, with empty info",0,null,null],["Derived key of type name: AES-GCM length: 128 using long derivedKey, empty salt, SHA-384, with empty info with bad hash name SHA384",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-GCM length: 128 using long derivedKey, empty salt, SHA-384, with empty info with missing deriveKey usage",0,null,null],["Derived key of type name: AES-GCM length: 128 using long derivedKey, empty salt, SHA-384, with empty info with wrong (ECDH) key",0,null,null],["Derived key of type name: AES-GCM length: 192 using long derivedKey, empty salt, SHA-384, with empty info",0,null,null],["Derived key of type name: AES-GCM length: 192 using long derivedKey, empty salt, SHA-384, with empty info with bad hash name SHA384",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-GCM length: 192 using long derivedKey, empty salt, SHA-384, with empty info with missing deriveKey usage",0,null,null],["Derived key of type name: AES-GCM length: 192 using long derivedKey, empty salt, SHA-384, with empty info with wrong (ECDH) key",0,null,null],["Derived key of type name: AES-GCM length: 256 using long derivedKey, empty salt, SHA-384, with empty info",0,null,null],["Derived key of type name: AES-GCM length: 256 using long derivedKey, empty salt, SHA-384, with empty info with bad hash name SHA384",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-GCM length: 256 using long derivedKey, empty salt, SHA-384, with empty info with missing deriveKey usage",0,null,null],["Derived key of type name: AES-GCM length: 256 using long derivedKey, empty salt, SHA-384, with empty info with wrong (ECDH) key",0,null,null],["Derived key of type name: AES-KW length: 128 using long derivedKey, empty salt, SHA-384, with empty info",0,null,null],["Derived key of type name: AES-KW length: 128 using long derivedKey, empty salt, SHA-384, with empty info with bad hash name SHA384",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-KW length: 128 using long derivedKey, empty salt, SHA-384, with empty info with missing deriveKey usage",0,null,null],["Derived key of type name: AES-KW length: 128 using long derivedKey, empty salt, SHA-384, with empty info with wrong (ECDH) key",0,null,null],["Derived key of type name: AES-KW length: 192 using long derivedKey, empty salt, SHA-384, with empty info",0,null,null],["Derived key of type name: AES-KW length: 192 using long derivedKey, empty salt, SHA-384, with empty info with bad hash name SHA384",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-KW length: 192 using long derivedKey, empty salt, SHA-384, with empty info with missing deriveKey usage",0,null,null],["Derived key of type name: AES-KW length: 192 using long derivedKey, empty salt, SHA-384, with empty info with wrong (ECDH) key",0,null,null],["Derived key of type name: AES-KW length: 256 using long derivedKey, empty salt, SHA-384, with empty info",0,null,null],["Derived key of type name: AES-KW length: 256 using long derivedKey, empty salt, SHA-384, with empty info with bad hash name SHA384",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-KW length: 256 using long derivedKey, empty salt, SHA-384, with empty info with missing deriveKey usage",0,null,null],["Derived key of type name: AES-KW length: 256 using long derivedKey, empty salt, SHA-384, with empty info with wrong (ECDH) key",0,null,null],["Derived key of type name: HMAC hash: SHA-1 length: 256 using long derivedKey, empty salt, SHA-384, with empty info",0,null,null],["Derived key of type name: HMAC hash: SHA-1 length: 256 using long derivedKey, empty salt, SHA-384, with empty info with bad hash name SHA384",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: HMAC hash: SHA-1 length: 256 using long derivedKey, empty salt, SHA-384, with empty info with missing deriveKey usage",0,null,null],["Derived key of type name: HMAC hash: SHA-1 length: 256 using long derivedKey, empty salt, SHA-384, with empty info with wrong (ECDH) key",0,null,null],["Derived key of type name: HMAC hash: SHA-256 length: 256 using long derivedKey, empty salt, SHA-384, with empty info",0,null,null],["Derived key of type name: HMAC hash: SHA-256 length: 256 using long derivedKey, empty salt, SHA-384, with empty info with bad hash name SHA384",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: HMAC hash: SHA-256 length: 256 using long derivedKey, empty salt, SHA-384, with empty info with missing deriveKey usage",0,null,null],["Derived key of type name: HMAC hash: SHA-256 length: 256 using long derivedKey, empty salt, SHA-384, with empty info with wrong (ECDH) key",0,null,null],["Derived key of type name: HMAC hash: SHA-384 length: 256 using long derivedKey, empty salt, SHA-384, with empty info",0,null,null],["Derived key of type name: HMAC hash: SHA-384 length: 256 using long derivedKey, empty salt, SHA-384, with empty info with bad hash name SHA384",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: HMAC hash: SHA-384 length: 256 using long derivedKey, empty salt, SHA-384, with empty info with missing deriveKey usage",0,null,null],["Derived key of type name: HMAC hash: SHA-384 length: 256 using long derivedKey, empty salt, SHA-384, with empty info with wrong (ECDH) key",0,null,null],["Derived key of type name: HMAC hash: SHA-512 length: 256 using long derivedKey, empty salt, SHA-384, with empty info",0,null,null],["Derived key of type name: HMAC hash: SHA-512 length: 256 using long derivedKey, empty salt, SHA-384, with empty info with bad hash name SHA384",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: HMAC hash: SHA-512 length: 256 using long derivedKey, empty salt, SHA-384, with empty info with missing deriveKey usage",0,null,null],["Derived key of type name: HMAC hash: SHA-512 length: 256 using long derivedKey, empty salt, SHA-384, with empty info with wrong (ECDH) key",0,null,null],["long derivedKey, empty salt, SHA-384, with empty info with missing salt",1,"assert_equals: deriveBits missing salt correctly threw OperationError: An invalid or illegal string was specified expected \"TypeError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:128:33\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:124:36\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:123:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["long derivedKey, empty salt, SHA-384, with empty info with missing info",1,"assert_equals: deriveBits missing info correctly threw OperationError: An invalid or illegal string was specified expected \"TypeError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:138:33\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:134:36\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:133:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["long derivedKey, empty salt, SHA-384, with empty info with null length",1,"assert_equals: deriveBits with null length correctly threw OperationError: Data provided to an operation does not meet requirements expected \"TypeError\" but got \"DataError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:148:33\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:144:36\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:143:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["long derivedKey, empty salt, SHA-384, with empty info with non-multiple of 8 length",1,"assert_unreached: non-multiple of 8 length should have thrown an OperationError Reached unreachable code","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:156:33\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:154:36\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:153:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["long derivedKey, empty salt, SHA-384, with empty info with bad hash name SHA384",1,"assert_equals: deriveBits with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:170:33\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:166:36\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:164:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["long derivedKey, empty salt, SHA-384, with empty info with missing deriveBits usage",0,null,null],["long derivedKey, empty salt, SHA-384, with empty info with wrong (ECDH) key",0,null,null],["long derivedKey, empty salt, SHA-512, with normal info",0,null,null],["long derivedKey, empty salt, SHA-512, with normal info with 0 length",1,"assert_equals: deriveBits with 0 length correctly threw OperationError: Data provided to an operation does not meet requirements expected \"OperationError\" but got \"DataError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:54:33\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:50:36\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:49:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-CBC length: 128 using long derivedKey, empty salt, SHA-512, with normal info",0,null,null],["Derived key of type name: AES-CBC length: 128 using long derivedKey, empty salt, SHA-512, with normal info with bad hash name SHA512",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-CBC length: 128 using long derivedKey, empty salt, SHA-512, with normal info with missing deriveKey usage",0,null,null],["Derived key of type name: AES-CBC length: 128 using long derivedKey, empty salt, SHA-512, with normal info with wrong (ECDH) key",0,null,null],["Derived key of type name: AES-CBC length: 192 using long derivedKey, empty salt, SHA-512, with normal info",0,null,null],["Derived key of type name: AES-CBC length: 192 using long derivedKey, empty salt, SHA-512, with normal info with bad hash name SHA512",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-CBC length: 192 using long derivedKey, empty salt, SHA-512, with normal info with missing deriveKey usage",0,null,null],["Derived key of type name: AES-CBC length: 192 using long derivedKey, empty salt, SHA-512, with normal info with wrong (ECDH) key",0,null,null],["Derived key of type name: AES-CBC length: 256 using long derivedKey, empty salt, SHA-512, with normal info",0,null,null],["Derived key of type name: AES-CBC length: 256 using long derivedKey, empty salt, SHA-512, with normal info with bad hash name SHA512",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-CBC length: 256 using long derivedKey, empty salt, SHA-512, with normal info with missing deriveKey usage",0,null,null],["Derived key of type name: AES-CBC length: 256 using long derivedKey, empty salt, SHA-512, with normal info with wrong (ECDH) key",0,null,null],["Derived key of type name: AES-CTR length: 128 using long derivedKey, empty salt, SHA-512, with normal info",0,null,null],["Derived key of type name: AES-CTR length: 128 using long derivedKey, empty salt, SHA-512, with normal info with bad hash name SHA512",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-CTR length: 128 using long derivedKey, empty salt, SHA-512, with normal info with missing deriveKey usage",0,null,null],["Derived key of type name: AES-CTR length: 128 using long derivedKey, empty salt, SHA-512, with normal info with wrong (ECDH) key",0,null,null],["Derived key of type name: AES-CTR length: 192 using long derivedKey, empty salt, SHA-512, with normal info",0,null,null],["Derived key of type name: AES-CTR length: 192 using long derivedKey, empty salt, SHA-512, with normal info with bad hash name SHA512",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-CTR length: 192 using long derivedKey, empty salt, SHA-512, with normal info with missing deriveKey usage",0,null,null],["Derived key of type name: AES-CTR length: 192 using long derivedKey, empty salt, SHA-512, with normal info with wrong (ECDH) key",0,null,null],["Derived key of type name: AES-CTR length: 256 using long derivedKey, empty salt, SHA-512, with normal info",0,null,null],["Derived key of type name: AES-CTR length: 256 using long derivedKey, empty salt, SHA-512, with normal info with bad hash name SHA512",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-CTR length: 256 using long derivedKey, empty salt, SHA-512, with normal info with missing deriveKey usage",0,null,null],["Derived key of type name: AES-CTR length: 256 using long derivedKey, empty salt, SHA-512, with normal info with wrong (ECDH) key",0,null,null],["Derived key of type name: AES-GCM length: 128 using long derivedKey, empty salt, SHA-512, with normal info",0,null,null],["Derived key of type name: AES-GCM length: 128 using long derivedKey, empty salt, SHA-512, with normal info with bad hash name SHA512",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-GCM length: 128 using long derivedKey, empty salt, SHA-512, with normal info with missing deriveKey usage",0,null,null],["Derived key of type name: AES-GCM length: 128 using long derivedKey, empty salt, SHA-512, with normal info with wrong (ECDH) key",0,null,null],["Derived key of type name: AES-GCM length: 192 using long derivedKey, empty salt, SHA-512, with normal info",0,null,null],["Derived key of type name: AES-GCM length: 192 using long derivedKey, empty salt, SHA-512, with normal info with bad hash name SHA512",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-GCM length: 192 using long derivedKey, empty salt, SHA-512, with normal info with missing deriveKey usage",0,null,null],["Derived key of type name: AES-GCM length: 192 using long derivedKey, empty salt, SHA-512, with normal info with wrong (ECDH) key",0,null,null],["Derived key of type name: AES-GCM length: 256 using long derivedKey, empty salt, SHA-512, with normal info",0,null,null],["Derived key of type name: AES-GCM length: 256 using long derivedKey, empty salt, SHA-512, with normal info with bad hash name SHA512",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-GCM length: 256 using long derivedKey, empty salt, SHA-512, with normal info with missing deriveKey usage",0,null,null],["Derived key of type name: AES-GCM length: 256 using long derivedKey, empty salt, SHA-512, with normal info with wrong (ECDH) key",0,null,null],["Derived key of type name: AES-KW length: 128 using long derivedKey, empty salt, SHA-512, with normal info",0,null,null],["Derived key of type name: AES-KW length: 128 using long derivedKey, empty salt, SHA-512, with normal info with bad hash name SHA512",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-KW length: 128 using long derivedKey, empty salt, SHA-512, with normal info with missing deriveKey usage",0,null,null],["Derived key of type name: AES-KW length: 128 using long derivedKey, empty salt, SHA-512, with normal info with wrong (ECDH) key",0,null,null],["Derived key of type name: AES-KW length: 192 using long derivedKey, empty salt, SHA-512, with normal info",0,null,null],["Derived key of type name: AES-KW length: 192 using long derivedKey, empty salt, SHA-512, with normal info with bad hash name SHA512",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-KW length: 192 using long derivedKey, empty salt, SHA-512, with normal info with missing deriveKey usage",0,null,null],["Derived key of type name: AES-KW length: 192 using long derivedKey, empty salt, SHA-512, with normal info with wrong (ECDH) key",0,null,null],["Derived key of type name: AES-KW length: 256 using long derivedKey, empty salt, SHA-512, with normal info",0,null,null],["Derived key of type name: AES-KW length: 256 using long derivedKey, empty salt, SHA-512, with normal info with bad hash name SHA512",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-KW length: 256 using long derivedKey, empty salt, SHA-512, with normal info with missing deriveKey usage",0,null,null],["Derived key of type name: AES-KW length: 256 using long derivedKey, empty salt, SHA-512, with normal info with wrong (ECDH) key",0,null,null],["Derived key of type name: HMAC hash: SHA-1 length: 256 using long derivedKey, empty salt, SHA-512, with normal info",0,null,null],["Derived key of type name: HMAC hash: SHA-1 length: 256 using long derivedKey, empty salt, SHA-512, with normal info with bad hash name SHA512",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: HMAC hash: SHA-1 length: 256 using long derivedKey, empty salt, SHA-512, with normal info with missing deriveKey usage",0,null,null],["Derived key of type name: HMAC hash: SHA-1 length: 256 using long derivedKey, empty salt, SHA-512, with normal info with wrong (ECDH) key",0,null,null],["Derived key of type name: HMAC hash: SHA-256 length: 256 using long derivedKey, empty salt, SHA-512, with normal info",0,null,null],["Derived key of type name: HMAC hash: SHA-256 length: 256 using long derivedKey, empty salt, SHA-512, with normal info with bad hash name SHA512",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: HMAC hash: SHA-256 length: 256 using long derivedKey, empty salt, SHA-512, with normal info with missing deriveKey usage",0,null,null],["Derived key of type name: HMAC hash: SHA-256 length: 256 using long derivedKey, empty salt, SHA-512, with normal info with wrong (ECDH) key",0,null,null],["Derived key of type name: HMAC hash: SHA-384 length: 256 using long derivedKey, empty salt, SHA-512, with normal info",0,null,null],["Derived key of type name: HMAC hash: SHA-384 length: 256 using long derivedKey, empty salt, SHA-512, with normal info with bad hash name SHA512",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: HMAC hash: SHA-384 length: 256 using long derivedKey, empty salt, SHA-512, with normal info with missing deriveKey usage",0,null,null],["Derived key of type name: HMAC hash: SHA-384 length: 256 using long derivedKey, empty salt, SHA-512, with normal info with wrong (ECDH) key",0,null,null],["Derived key of type name: HMAC hash: SHA-512 length: 256 using long derivedKey, empty salt, SHA-512, with normal info",0,null,null],["Derived key of type name: HMAC hash: SHA-512 length: 256 using long derivedKey, empty salt, SHA-512, with normal info with bad hash name SHA512",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: HMAC hash: SHA-512 length: 256 using long derivedKey, empty salt, SHA-512, with normal info with missing deriveKey usage",0,null,null],["Derived key of type name: HMAC hash: SHA-512 length: 256 using long derivedKey, empty salt, SHA-512, with normal info with wrong (ECDH) key",0,null,null],["long derivedKey, empty salt, SHA-512, with normal info with missing salt",1,"assert_equals: deriveBits missing salt correctly threw OperationError: An invalid or illegal string was specified expected \"TypeError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:128:33\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:124:36\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:123:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["long derivedKey, empty salt, SHA-512, with normal info with missing info",1,"assert_equals: deriveBits missing info correctly threw OperationError: An invalid or illegal string was specified expected \"TypeError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:138:33\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:134:36\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:133:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["long derivedKey, empty salt, SHA-512, with normal info with null length",1,"assert_equals: deriveBits with null length correctly threw OperationError: Data provided to an operation does not meet requirements expected \"TypeError\" but got \"DataError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:148:33\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:144:36\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:143:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["long derivedKey, empty salt, SHA-512, with normal info with non-multiple of 8 length",1,"assert_unreached: non-multiple of 8 length should have thrown an OperationError Reached unreachable code","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:156:33\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:154:36\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:153:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["long derivedKey, empty salt, SHA-512, with normal info with bad hash name SHA512",1,"assert_equals: deriveBits with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:170:33\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:166:36\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:164:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["long derivedKey, empty salt, SHA-512, with normal info with missing deriveBits usage",0,null,null],["long derivedKey, empty salt, SHA-512, with normal info with wrong (ECDH) key",0,null,null],["long derivedKey, empty salt, SHA-512, with empty info",0,null,null],["long derivedKey, empty salt, SHA-512, with empty info with 0 length",1,"assert_equals: deriveBits with 0 length correctly threw OperationError: Data provided to an operation does not meet requirements expected \"OperationError\" but got \"DataError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:54:33\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:50:36\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:49:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-CBC length: 128 using long derivedKey, empty salt, SHA-512, with empty info",0,null,null],["Derived key of type name: AES-CBC length: 128 using long derivedKey, empty salt, SHA-512, with empty info with bad hash name SHA512",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-CBC length: 128 using long derivedKey, empty salt, SHA-512, with empty info with missing deriveKey usage",0,null,null],["Derived key of type name: AES-CBC length: 128 using long derivedKey, empty salt, SHA-512, with empty info with wrong (ECDH) key",0,null,null],["Derived key of type name: AES-CBC length: 192 using long derivedKey, empty salt, SHA-512, with empty info",0,null,null],["Derived key of type name: AES-CBC length: 192 using long derivedKey, empty salt, SHA-512, with empty info with bad hash name SHA512",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-CBC length: 192 using long derivedKey, empty salt, SHA-512, with empty info with missing deriveKey usage",0,null,null],["Derived key of type name: AES-CBC length: 192 using long derivedKey, empty salt, SHA-512, with empty info with wrong (ECDH) key",0,null,null],["Derived key of type name: AES-CBC length: 256 using long derivedKey, empty salt, SHA-512, with empty info",0,null,null],["Derived key of type name: AES-CBC length: 256 using long derivedKey, empty salt, SHA-512, with empty info with bad hash name SHA512",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-CBC length: 256 using long derivedKey, empty salt, SHA-512, with empty info with missing deriveKey usage",0,null,null],["Derived key of type name: AES-CBC length: 256 using long derivedKey, empty salt, SHA-512, with empty info with wrong (ECDH) key",0,null,null],["Derived key of type name: AES-CTR length: 128 using long derivedKey, empty salt, SHA-512, with empty info",0,null,null],["Derived key of type name: AES-CTR length: 128 using long derivedKey, empty salt, SHA-512, with empty info with bad hash name SHA512",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-CTR length: 128 using long derivedKey, empty salt, SHA-512, with empty info with missing deriveKey usage",0,null,null],["Derived key of type name: AES-CTR length: 128 using long derivedKey, empty salt, SHA-512, with empty info with wrong (ECDH) key",0,null,null],["Derived key of type name: AES-CTR length: 192 using long derivedKey, empty salt, SHA-512, with empty info",0,null,null],["Derived key of type name: AES-CTR length: 192 using long derivedKey, empty salt, SHA-512, with empty info with bad hash name SHA512",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-CTR length: 192 using long derivedKey, empty salt, SHA-512, with empty info with missing deriveKey usage",0,null,null],["Derived key of type name: AES-CTR length: 192 using long derivedKey, empty salt, SHA-512, with empty info with wrong (ECDH) key",0,null,null],["Derived key of type name: AES-CTR length: 256 using long derivedKey, empty salt, SHA-512, with empty info",0,null,null],["Derived key of type name: AES-CTR length: 256 using long derivedKey, empty salt, SHA-512, with empty info with bad hash name SHA512",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-CTR length: 256 using long derivedKey, empty salt, SHA-512, with empty info with missing deriveKey usage",0,null,null],["Derived key of type name: AES-CTR length: 256 using long derivedKey, empty salt, SHA-512, with empty info with wrong (ECDH) key",0,null,null],["Derived key of type name: AES-GCM length: 128 using long derivedKey, empty salt, SHA-512, with empty info",0,null,null],["Derived key of type name: AES-GCM length: 128 using long derivedKey, empty salt, SHA-512, with empty info with bad hash name SHA512",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-GCM length: 128 using long derivedKey, empty salt, SHA-512, with empty info with missing deriveKey usage",0,null,null],["Derived key of type name: AES-GCM length: 128 using long derivedKey, empty salt, SHA-512, with empty info with wrong (ECDH) key",0,null,null],["Derived key of type name: AES-GCM length: 192 using long derivedKey, empty salt, SHA-512, with empty info",0,null,null],["Derived key of type name: AES-GCM length: 192 using long derivedKey, empty salt, SHA-512, with empty info with bad hash name SHA512",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-GCM length: 192 using long derivedKey, empty salt, SHA-512, with empty info with missing deriveKey usage",0,null,null],["Derived key of type name: AES-GCM length: 192 using long derivedKey, empty salt, SHA-512, with empty info with wrong (ECDH) key",0,null,null],["Derived key of type name: AES-GCM length: 256 using long derivedKey, empty salt, SHA-512, with empty info",0,null,null],["Derived key of type name: AES-GCM length: 256 using long derivedKey, empty salt, SHA-512, with empty info with bad hash name SHA512",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-GCM length: 256 using long derivedKey, empty salt, SHA-512, with empty info with missing deriveKey usage",0,null,null],["Derived key of type name: AES-GCM length: 256 using long derivedKey, empty salt, SHA-512, with empty info with wrong (ECDH) key",0,null,null],["Derived key of type name: AES-KW length: 128 using long derivedKey, empty salt, SHA-512, with empty info",0,null,null],["Derived key of type name: AES-KW length: 128 using long derivedKey, empty salt, SHA-512, with empty info with bad hash name SHA512",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-KW length: 128 using long derivedKey, empty salt, SHA-512, with empty info with missing deriveKey usage",0,null,null],["Derived key of type name: AES-KW length: 128 using long derivedKey, empty salt, SHA-512, with empty info with wrong (ECDH) key",0,null,null],["Derived key of type name: AES-KW length: 192 using long derivedKey, empty salt, SHA-512, with empty info",0,null,null],["Derived key of type name: AES-KW length: 192 using long derivedKey, empty salt, SHA-512, with empty info with bad hash name SHA512",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-KW length: 192 using long derivedKey, empty salt, SHA-512, with empty info with missing deriveKey usage",0,null,null],["Derived key of type name: AES-KW length: 192 using long derivedKey, empty salt, SHA-512, with empty info with wrong (ECDH) key",0,null,null],["Derived key of type name: AES-KW length: 256 using long derivedKey, empty salt, SHA-512, with empty info",0,null,null],["Derived key of type name: AES-KW length: 256 using long derivedKey, empty salt, SHA-512, with empty info with bad hash name SHA512",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-KW length: 256 using long derivedKey, empty salt, SHA-512, with empty info with missing deriveKey usage",0,null,null],["Derived key of type name: AES-KW length: 256 using long derivedKey, empty salt, SHA-512, with empty info with wrong (ECDH) key",0,null,null],["Derived key of type name: HMAC hash: SHA-1 length: 256 using long derivedKey, empty salt, SHA-512, with empty info",0,null,null],["Derived key of type name: HMAC hash: SHA-1 length: 256 using long derivedKey, empty salt, SHA-512, with empty info with bad hash name SHA512",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: HMAC hash: SHA-1 length: 256 using long derivedKey, empty salt, SHA-512, with empty info with missing deriveKey usage",0,null,null],["Derived key of type name: HMAC hash: SHA-1 length: 256 using long derivedKey, empty salt, SHA-512, with empty info with wrong (ECDH) key",0,null,null],["Derived key of type name: HMAC hash: SHA-256 length: 256 using long derivedKey, empty salt, SHA-512, with empty info",0,null,null],["Derived key of type name: HMAC hash: SHA-256 length: 256 using long derivedKey, empty salt, SHA-512, with empty info with bad hash name SHA512",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: HMAC hash: SHA-256 length: 256 using long derivedKey, empty salt, SHA-512, with empty info with missing deriveKey usage",0,null,null],["Derived key of type name: HMAC hash: SHA-256 length: 256 using long derivedKey, empty salt, SHA-512, with empty info with wrong (ECDH) key",0,null,null],["Derived key of type name: HMAC hash: SHA-384 length: 256 using long derivedKey, empty salt, SHA-512, with empty info",0,null,null],["Derived key of type name: HMAC hash: SHA-384 length: 256 using long derivedKey, empty salt, SHA-512, with empty info with bad hash name SHA512",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: HMAC hash: SHA-384 length: 256 using long derivedKey, empty salt, SHA-512, with empty info with missing deriveKey usage",0,null,null],["Derived key of type name: HMAC hash: SHA-384 length: 256 using long derivedKey, empty salt, SHA-512, with empty info with wrong (ECDH) key",0,null,null],["Derived key of type name: HMAC hash: SHA-512 length: 256 using long derivedKey, empty salt, SHA-512, with empty info",0,null,null],["Derived key of type name: HMAC hash: SHA-512 length: 256 using long derivedKey, empty salt, SHA-512, with empty info with bad hash name SHA512",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: HMAC hash: SHA-512 length: 256 using long derivedKey, empty salt, SHA-512, with empty info with missing deriveKey usage",0,null,null],["Derived key of type name: HMAC hash: SHA-512 length: 256 using long derivedKey, empty salt, SHA-512, with empty info with wrong (ECDH) key",0,null,null],["long derivedKey, empty salt, SHA-512, with empty info with missing salt",1,"assert_equals: deriveBits missing salt correctly threw OperationError: An invalid or illegal string was specified expected \"TypeError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:128:33\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:124:36\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:123:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["long derivedKey, empty salt, SHA-512, with empty info with missing info",1,"assert_equals: deriveBits missing info correctly threw OperationError: An invalid or illegal string was specified expected \"TypeError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:138:33\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:134:36\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:133:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["long derivedKey, empty salt, SHA-512, with empty info with null length",1,"assert_equals: deriveBits with null length correctly threw OperationError: Data provided to an operation does not meet requirements expected \"TypeError\" but got \"DataError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:148:33\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:144:36\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:143:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["long derivedKey, empty salt, SHA-512, with empty info with non-multiple of 8 length",1,"assert_unreached: non-multiple of 8 length should have thrown an OperationError Reached unreachable code","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:156:33\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:154:36\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:153:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["long derivedKey, empty salt, SHA-512, with empty info with bad hash name SHA512",1,"assert_equals: deriveBits with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:170:33\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:166:36\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:164:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["long derivedKey, empty salt, SHA-512, with empty info with missing deriveBits usage",0,null,null],["long derivedKey, empty salt, SHA-512, with empty info with wrong (ECDH) key",0,null,null],["long derivedKey, empty salt, SHA-1, with normal info",0,null,null],["long derivedKey, empty salt, SHA-1, with normal info with 0 length",1,"assert_equals: deriveBits with 0 length correctly threw OperationError: Data provided to an operation does not meet requirements expected \"OperationError\" but got \"DataError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:54:33\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:50:36\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:49:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-CBC length: 128 using long derivedKey, empty salt, SHA-1, with normal info",0,null,null],["Derived key of type name: AES-CBC length: 128 using long derivedKey, empty salt, SHA-1, with normal info with bad hash name SHA1",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-CBC length: 128 using long derivedKey, empty salt, SHA-1, with normal info with missing deriveKey usage",0,null,null],["Derived key of type name: AES-CBC length: 128 using long derivedKey, empty salt, SHA-1, with normal info with wrong (ECDH) key",0,null,null],["Derived key of type name: AES-CBC length: 192 using long derivedKey, empty salt, SHA-1, with normal info",0,null,null],["Derived key of type name: AES-CBC length: 192 using long derivedKey, empty salt, SHA-1, with normal info with bad hash name SHA1",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-CBC length: 192 using long derivedKey, empty salt, SHA-1, with normal info with missing deriveKey usage",0,null,null],["Derived key of type name: AES-CBC length: 192 using long derivedKey, empty salt, SHA-1, with normal info with wrong (ECDH) key",0,null,null],["Derived key of type name: AES-CBC length: 256 using long derivedKey, empty salt, SHA-1, with normal info",0,null,null],["Derived key of type name: AES-CBC length: 256 using long derivedKey, empty salt, SHA-1, with normal info with bad hash name SHA1",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-CBC length: 256 using long derivedKey, empty salt, SHA-1, with normal info with missing deriveKey usage",0,null,null],["Derived key of type name: AES-CBC length: 256 using long derivedKey, empty salt, SHA-1, with normal info with wrong (ECDH) key",0,null,null],["Derived key of type name: AES-CTR length: 128 using long derivedKey, empty salt, SHA-1, with normal info",0,null,null],["Derived key of type name: AES-CTR length: 128 using long derivedKey, empty salt, SHA-1, with normal info with bad hash name SHA1",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-CTR length: 128 using long derivedKey, empty salt, SHA-1, with normal info with missing deriveKey usage",0,null,null],["Derived key of type name: AES-CTR length: 128 using long derivedKey, empty salt, SHA-1, with normal info with wrong (ECDH) key",0,null,null],["Derived key of type name: AES-CTR length: 192 using long derivedKey, empty salt, SHA-1, with normal info",0,null,null],["Derived key of type name: AES-CTR length: 192 using long derivedKey, empty salt, SHA-1, with normal info with bad hash name SHA1",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-CTR length: 192 using long derivedKey, empty salt, SHA-1, with normal info with missing deriveKey usage",0,null,null],["Derived key of type name: AES-CTR length: 192 using long derivedKey, empty salt, SHA-1, with normal info with wrong (ECDH) key",0,null,null],["Derived key of type name: AES-CTR length: 256 using long derivedKey, empty salt, SHA-1, with normal info",0,null,null],["Derived key of type name: AES-CTR length: 256 using long derivedKey, empty salt, SHA-1, with normal info with bad hash name SHA1",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-CTR length: 256 using long derivedKey, empty salt, SHA-1, with normal info with missing deriveKey usage",0,null,null],["Derived key of type name: AES-CTR length: 256 using long derivedKey, empty salt, SHA-1, with normal info with wrong (ECDH) key",0,null,null],["Derived key of type name: AES-GCM length: 128 using long derivedKey, empty salt, SHA-1, with normal info",0,null,null],["Derived key of type name: AES-GCM length: 128 using long derivedKey, empty salt, SHA-1, with normal info with bad hash name SHA1",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-GCM length: 128 using long derivedKey, empty salt, SHA-1, with normal info with missing deriveKey usage",0,null,null],["Derived key of type name: AES-GCM length: 128 using long derivedKey, empty salt, SHA-1, with normal info with wrong (ECDH) key",0,null,null],["Derived key of type name: AES-GCM length: 192 using long derivedKey, empty salt, SHA-1, with normal info",0,null,null],["Derived key of type name: AES-GCM length: 192 using long derivedKey, empty salt, SHA-1, with normal info with bad hash name SHA1",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-GCM length: 192 using long derivedKey, empty salt, SHA-1, with normal info with missing deriveKey usage",0,null,null],["Derived key of type name: AES-GCM length: 192 using long derivedKey, empty salt, SHA-1, with normal info with wrong (ECDH) key",0,null,null],["Derived key of type name: AES-GCM length: 256 using long derivedKey, empty salt, SHA-1, with normal info",0,null,null],["Derived key of type name: AES-GCM length: 256 using long derivedKey, empty salt, SHA-1, with normal info with bad hash name SHA1",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-GCM length: 256 using long derivedKey, empty salt, SHA-1, with normal info with missing deriveKey usage",0,null,null],["Derived key of type name: AES-GCM length: 256 using long derivedKey, empty salt, SHA-1, with normal info with wrong (ECDH) key",0,null,null],["Derived key of type name: AES-KW length: 128 using long derivedKey, empty salt, SHA-1, with normal info",0,null,null],["Derived key of type name: AES-KW length: 128 using long derivedKey, empty salt, SHA-1, with normal info with bad hash name SHA1",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-KW length: 128 using long derivedKey, empty salt, SHA-1, with normal info with missing deriveKey usage",0,null,null],["Derived key of type name: AES-KW length: 128 using long derivedKey, empty salt, SHA-1, with normal info with wrong (ECDH) key",0,null,null],["Derived key of type name: AES-KW length: 192 using long derivedKey, empty salt, SHA-1, with normal info",0,null,null],["Derived key of type name: AES-KW length: 192 using long derivedKey, empty salt, SHA-1, with normal info with bad hash name SHA1",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-KW length: 192 using long derivedKey, empty salt, SHA-1, with normal info with missing deriveKey usage",0,null,null],["Derived key of type name: AES-KW length: 192 using long derivedKey, empty salt, SHA-1, with normal info with wrong (ECDH) key",0,null,null],["Derived key of type name: AES-KW length: 256 using long derivedKey, empty salt, SHA-1, with normal info",0,null,null],["Derived key of type name: AES-KW length: 256 using long derivedKey, empty salt, SHA-1, with normal info with bad hash name SHA1",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-KW length: 256 using long derivedKey, empty salt, SHA-1, with normal info with missing deriveKey usage",0,null,null],["Derived key of type name: AES-KW length: 256 using long derivedKey, empty salt, SHA-1, with normal info with wrong (ECDH) key",0,null,null],["Derived key of type name: HMAC hash: SHA-1 length: 256 using long derivedKey, empty salt, SHA-1, with normal info",0,null,null],["Derived key of type name: HMAC hash: SHA-1 length: 256 using long derivedKey, empty salt, SHA-1, with normal info with bad hash name SHA1",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: HMAC hash: SHA-1 length: 256 using long derivedKey, empty salt, SHA-1, with normal info with missing deriveKey usage",0,null,null],["Derived key of type name: HMAC hash: SHA-1 length: 256 using long derivedKey, empty salt, SHA-1, with normal info with wrong (ECDH) key",0,null,null],["Derived key of type name: HMAC hash: SHA-256 length: 256 using long derivedKey, empty salt, SHA-1, with normal info",0,null,null],["Derived key of type name: HMAC hash: SHA-256 length: 256 using long derivedKey, empty salt, SHA-1, with normal info with bad hash name SHA1",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: HMAC hash: SHA-256 length: 256 using long derivedKey, empty salt, SHA-1, with normal info with missing deriveKey usage",0,null,null],["Derived key of type name: HMAC hash: SHA-256 length: 256 using long derivedKey, empty salt, SHA-1, with normal info with wrong (ECDH) key",0,null,null],["Derived key of type name: HMAC hash: SHA-384 length: 256 using long derivedKey, empty salt, SHA-1, with normal info",0,null,null],["Derived key of type name: HMAC hash: SHA-384 length: 256 using long derivedKey, empty salt, SHA-1, with normal info with bad hash name SHA1",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: HMAC hash: SHA-384 length: 256 using long derivedKey, empty salt, SHA-1, with normal info with missing deriveKey usage",0,null,null],["Derived key of type name: HMAC hash: SHA-384 length: 256 using long derivedKey, empty salt, SHA-1, with normal info with wrong (ECDH) key",0,null,null],["Derived key of type name: HMAC hash: SHA-512 length: 256 using long derivedKey, empty salt, SHA-1, with normal info",0,null,null],["Derived key of type name: HMAC hash: SHA-512 length: 256 using long derivedKey, empty salt, SHA-1, with normal info with bad hash name SHA1",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: HMAC hash: SHA-512 length: 256 using long derivedKey, empty salt, SHA-1, with normal info with missing deriveKey usage",0,null,null],["Derived key of type name: HMAC hash: SHA-512 length: 256 using long derivedKey, empty salt, SHA-1, with normal info with wrong (ECDH) key",0,null,null],["long derivedKey, empty salt, SHA-1, with normal info with missing salt",1,"assert_equals: deriveBits missing salt correctly threw OperationError: An invalid or illegal string was specified expected \"TypeError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:128:33\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:124:36\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:123:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["long derivedKey, empty salt, SHA-1, with normal info with missing info",1,"assert_equals: deriveBits missing info correctly threw OperationError: An invalid or illegal string was specified expected \"TypeError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:138:33\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:134:36\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:133:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["long derivedKey, empty salt, SHA-1, with normal info with null length",1,"assert_equals: deriveBits with null length correctly threw OperationError: Data provided to an operation does not meet requirements expected \"TypeError\" but got \"DataError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:148:33\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:144:36\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:143:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["long derivedKey, empty salt, SHA-1, with normal info with non-multiple of 8 length",1,"assert_unreached: non-multiple of 8 length should have thrown an OperationError Reached unreachable code","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:156:33\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:154:36\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:153:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["long derivedKey, empty salt, SHA-1, with normal info with bad hash name SHA1",1,"assert_equals: deriveBits with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:170:33\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:166:36\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:164:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["long derivedKey, empty salt, SHA-1, with normal info with missing deriveBits usage",0,null,null],["long derivedKey, empty salt, SHA-1, with normal info with wrong (ECDH) key",0,null,null],["long derivedKey, empty salt, SHA-1, with empty info",0,null,null],["long derivedKey, empty salt, SHA-1, with empty info with 0 length",1,"assert_equals: deriveBits with 0 length correctly threw OperationError: Data provided to an operation does not meet requirements expected \"OperationError\" but got \"DataError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:54:33\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:50:36\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:49:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-CBC length: 128 using long derivedKey, empty salt, SHA-1, with empty info",0,null,null],["Derived key of type name: AES-CBC length: 128 using long derivedKey, empty salt, SHA-1, with empty info with bad hash name SHA1",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-CBC length: 128 using long derivedKey, empty salt, SHA-1, with empty info with missing deriveKey usage",0,null,null],["Derived key of type name: AES-CBC length: 128 using long derivedKey, empty salt, SHA-1, with empty info with wrong (ECDH) key",0,null,null],["Derived key of type name: AES-CBC length: 192 using long derivedKey, empty salt, SHA-1, with empty info",0,null,null],["Derived key of type name: AES-CBC length: 192 using long derivedKey, empty salt, SHA-1, with empty info with bad hash name SHA1",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-CBC length: 192 using long derivedKey, empty salt, SHA-1, with empty info with missing deriveKey usage",0,null,null],["Derived key of type name: AES-CBC length: 192 using long derivedKey, empty salt, SHA-1, with empty info with wrong (ECDH) key",0,null,null],["Derived key of type name: AES-CBC length: 256 using long derivedKey, empty salt, SHA-1, with empty info",0,null,null],["Derived key of type name: AES-CBC length: 256 using long derivedKey, empty salt, SHA-1, with empty info with bad hash name SHA1",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-CBC length: 256 using long derivedKey, empty salt, SHA-1, with empty info with missing deriveKey usage",0,null,null],["Derived key of type name: AES-CBC length: 256 using long derivedKey, empty salt, SHA-1, with empty info with wrong (ECDH) key",0,null,null],["Derived key of type name: AES-CTR length: 128 using long derivedKey, empty salt, SHA-1, with empty info",0,null,null],["Derived key of type name: AES-CTR length: 128 using long derivedKey, empty salt, SHA-1, with empty info with bad hash name SHA1",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-CTR length: 128 using long derivedKey, empty salt, SHA-1, with empty info with missing deriveKey usage",0,null,null],["Derived key of type name: AES-CTR length: 128 using long derivedKey, empty salt, SHA-1, with empty info with wrong (ECDH) key",0,null,null],["Derived key of type name: AES-CTR length: 192 using long derivedKey, empty salt, SHA-1, with empty info",0,null,null],["Derived key of type name: AES-CTR length: 192 using long derivedKey, empty salt, SHA-1, with empty info with bad hash name SHA1",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-CTR length: 192 using long derivedKey, empty salt, SHA-1, with empty info with missing deriveKey usage",0,null,null],["Derived key of type name: AES-CTR length: 192 using long derivedKey, empty salt, SHA-1, with empty info with wrong (ECDH) key",0,null,null],["Derived key of type name: AES-CTR length: 256 using long derivedKey, empty salt, SHA-1, with empty info",0,null,null],["Derived key of type name: AES-CTR length: 256 using long derivedKey, empty salt, SHA-1, with empty info with bad hash name SHA1",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-CTR length: 256 using long derivedKey, empty salt, SHA-1, with empty info with missing deriveKey usage",0,null,null],["Derived key of type name: AES-CTR length: 256 using long derivedKey, empty salt, SHA-1, with empty info with wrong (ECDH) key",0,null,null],["Derived key of type name: AES-GCM length: 128 using long derivedKey, empty salt, SHA-1, with empty info",0,null,null],["Derived key of type name: AES-GCM length: 128 using long derivedKey, empty salt, SHA-1, with empty info with bad hash name SHA1",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-GCM length: 128 using long derivedKey, empty salt, SHA-1, with empty info with missing deriveKey usage",0,null,null],["Derived key of type name: AES-GCM length: 128 using long derivedKey, empty salt, SHA-1, with empty info with wrong (ECDH) key",0,null,null],["Derived key of type name: AES-GCM length: 192 using long derivedKey, empty salt, SHA-1, with empty info",0,null,null],["Derived key of type name: AES-GCM length: 192 using long derivedKey, empty salt, SHA-1, with empty info with bad hash name SHA1",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-GCM length: 192 using long derivedKey, empty salt, SHA-1, with empty info with missing deriveKey usage",0,null,null],["Derived key of type name: AES-GCM length: 192 using long derivedKey, empty salt, SHA-1, with empty info with wrong (ECDH) key",0,null,null],["Derived key of type name: AES-GCM length: 256 using long derivedKey, empty salt, SHA-1, with empty info",0,null,null],["Derived key of type name: AES-GCM length: 256 using long derivedKey, empty salt, SHA-1, with empty info with bad hash name SHA1",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-GCM length: 256 using long derivedKey, empty salt, SHA-1, with empty info with missing deriveKey usage",0,null,null],["Derived key of type name: AES-GCM length: 256 using long derivedKey, empty salt, SHA-1, with empty info with wrong (ECDH) key",0,null,null],["Derived key of type name: AES-KW length: 128 using long derivedKey, empty salt, SHA-1, with empty info",0,null,null],["Derived key of type name: AES-KW length: 128 using long derivedKey, empty salt, SHA-1, with empty info with bad hash name SHA1",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-KW length: 128 using long derivedKey, empty salt, SHA-1, with empty info with missing deriveKey usage",0,null,null],["Derived key of type name: AES-KW length: 128 using long derivedKey, empty salt, SHA-1, with empty info with wrong (ECDH) key",0,null,null],["Derived key of type name: AES-KW length: 192 using long derivedKey, empty salt, SHA-1, with empty info",0,null,null],["Derived key of type name: AES-KW length: 192 using long derivedKey, empty salt, SHA-1, with empty info with bad hash name SHA1",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-KW length: 192 using long derivedKey, empty salt, SHA-1, with empty info with missing deriveKey usage",0,null,null],["Derived key of type name: AES-KW length: 192 using long derivedKey, empty salt, SHA-1, with empty info with wrong (ECDH) key",0,null,null],["Derived key of type name: AES-KW length: 256 using long derivedKey, empty salt, SHA-1, with empty info",0,null,null],["Derived key of type name: AES-KW length: 256 using long derivedKey, empty salt, SHA-1, with empty info with bad hash name SHA1",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-KW length: 256 using long derivedKey, empty salt, SHA-1, with empty info with missing deriveKey usage",0,null,null],["Derived key of type name: AES-KW length: 256 using long derivedKey, empty salt, SHA-1, with empty info with wrong (ECDH) key",0,null,null],["Derived key of type name: HMAC hash: SHA-1 length: 256 using long derivedKey, empty salt, SHA-1, with empty info",0,null,null],["Derived key of type name: HMAC hash: SHA-1 length: 256 using long derivedKey, empty salt, SHA-1, with empty info with bad hash name SHA1",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: HMAC hash: SHA-1 length: 256 using long derivedKey, empty salt, SHA-1, with empty info with missing deriveKey usage",0,null,null],["Derived key of type name: HMAC hash: SHA-1 length: 256 using long derivedKey, empty salt, SHA-1, with empty info with wrong (ECDH) key",0,null,null],["Derived key of type name: HMAC hash: SHA-256 length: 256 using long derivedKey, empty salt, SHA-1, with empty info",0,null,null],["Derived key of type name: HMAC hash: SHA-256 length: 256 using long derivedKey, empty salt, SHA-1, with empty info with bad hash name SHA1",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: HMAC hash: SHA-256 length: 256 using long derivedKey, empty salt, SHA-1, with empty info with missing deriveKey usage",0,null,null],["Derived key of type name: HMAC hash: SHA-256 length: 256 using long derivedKey, empty salt, SHA-1, with empty info with wrong (ECDH) key",0,null,null],["Derived key of type name: HMAC hash: SHA-384 length: 256 using long derivedKey, empty salt, SHA-1, with empty info",0,null,null],["Derived key of type name: HMAC hash: SHA-384 length: 256 using long derivedKey, empty salt, SHA-1, with empty info with bad hash name SHA1",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: HMAC hash: SHA-384 length: 256 using long derivedKey, empty salt, SHA-1, with empty info with missing deriveKey usage",0,null,null],["Derived key of type name: HMAC hash: SHA-384 length: 256 using long derivedKey, empty salt, SHA-1, with empty info with wrong (ECDH) key",0,null,null],["Derived key of type name: HMAC hash: SHA-512 length: 256 using long derivedKey, empty salt, SHA-1, with empty info",0,null,null],["Derived key of type name: HMAC hash: SHA-512 length: 256 using long derivedKey, empty salt, SHA-1, with empty info with bad hash name SHA1",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: HMAC hash: SHA-512 length: 256 using long derivedKey, empty salt, SHA-1, with empty info with missing deriveKey usage",0,null,null],["Derived key of type name: HMAC hash: SHA-512 length: 256 using long derivedKey, empty salt, SHA-1, with empty info with wrong (ECDH) key",0,null,null],["long derivedKey, empty salt, SHA-1, with empty info with missing salt",1,"assert_equals: deriveBits missing salt correctly threw OperationError: An invalid or illegal string was specified expected \"TypeError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:128:33\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:124:36\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:123:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["long derivedKey, empty salt, SHA-1, with empty info with missing info",1,"assert_equals: deriveBits missing info correctly threw OperationError: An invalid or illegal string was specified expected \"TypeError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:138:33\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:134:36\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:133:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["long derivedKey, empty salt, SHA-1, with empty info with null length",1,"assert_equals: deriveBits with null length correctly threw OperationError: Data provided to an operation does not meet requirements expected \"TypeError\" but got \"DataError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:148:33\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:144:36\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:143:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["long derivedKey, empty salt, SHA-1, with empty info with non-multiple of 8 length",1,"assert_unreached: non-multiple of 8 length should have thrown an OperationError Reached unreachable code","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:156:33\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:154:36\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:153:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["long derivedKey, empty salt, SHA-1, with empty info with bad hash name SHA1",1,"assert_equals: deriveBits with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:170:33\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:166:36\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:164:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["long derivedKey, empty salt, SHA-1, with empty info with missing deriveBits usage",0,null,null],["long derivedKey, empty salt, SHA-1, with empty info with wrong (ECDH) key",0,null,null],["long derivedKey, empty salt, SHA-256, with normal info",0,null,null],["long derivedKey, empty salt, SHA-256, with normal info with 0 length",1,"assert_equals: deriveBits with 0 length correctly threw OperationError: Data provided to an operation does not meet requirements expected \"OperationError\" but got \"DataError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:54:33\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:50:36\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:49:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-CBC length: 128 using long derivedKey, empty salt, SHA-256, with normal info",0,null,null],["Derived key of type name: AES-CBC length: 128 using long derivedKey, empty salt, SHA-256, with normal info with bad hash name SHA256",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-CBC length: 128 using long derivedKey, empty salt, SHA-256, with normal info with missing deriveKey usage",0,null,null],["Derived key of type name: AES-CBC length: 128 using long derivedKey, empty salt, SHA-256, with normal info with wrong (ECDH) key",0,null,null],["Derived key of type name: AES-CBC length: 192 using long derivedKey, empty salt, SHA-256, with normal info",0,null,null],["Derived key of type name: AES-CBC length: 192 using long derivedKey, empty salt, SHA-256, with normal info with bad hash name SHA256",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-CBC length: 192 using long derivedKey, empty salt, SHA-256, with normal info with missing deriveKey usage",0,null,null],["Derived key of type name: AES-CBC length: 192 using long derivedKey, empty salt, SHA-256, with normal info with wrong (ECDH) key",0,null,null],["Derived key of type name: AES-CBC length: 256 using long derivedKey, empty salt, SHA-256, with normal info",0,null,null],["Derived key of type name: AES-CBC length: 256 using long derivedKey, empty salt, SHA-256, with normal info with bad hash name SHA256",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-CBC length: 256 using long derivedKey, empty salt, SHA-256, with normal info with missing deriveKey usage",0,null,null],["Derived key of type name: AES-CBC length: 256 using long derivedKey, empty salt, SHA-256, with normal info with wrong (ECDH) key",0,null,null],["Derived key of type name: AES-CTR length: 128 using long derivedKey, empty salt, SHA-256, with normal info",0,null,null],["Derived key of type name: AES-CTR length: 128 using long derivedKey, empty salt, SHA-256, with normal info with bad hash name SHA256",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-CTR length: 128 using long derivedKey, empty salt, SHA-256, with normal info with missing deriveKey usage",0,null,null],["Derived key of type name: AES-CTR length: 128 using long derivedKey, empty salt, SHA-256, with normal info with wrong (ECDH) key",0,null,null],["Derived key of type name: AES-CTR length: 192 using long derivedKey, empty salt, SHA-256, with normal info",0,null,null],["Derived key of type name: AES-CTR length: 192 using long derivedKey, empty salt, SHA-256, with normal info with bad hash name SHA256",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-CTR length: 192 using long derivedKey, empty salt, SHA-256, with normal info with missing deriveKey usage",0,null,null],["Derived key of type name: AES-CTR length: 192 using long derivedKey, empty salt, SHA-256, with normal info with wrong (ECDH) key",0,null,null],["Derived key of type name: AES-CTR length: 256 using long derivedKey, empty salt, SHA-256, with normal info",0,null,null],["Derived key of type name: AES-CTR length: 256 using long derivedKey, empty salt, SHA-256, with normal info with bad hash name SHA256",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-CTR length: 256 using long derivedKey, empty salt, SHA-256, with normal info with missing deriveKey usage",0,null,null],["Derived key of type name: AES-CTR length: 256 using long derivedKey, empty salt, SHA-256, with normal info with wrong (ECDH) key",0,null,null],["Derived key of type name: AES-GCM length: 128 using long derivedKey, empty salt, SHA-256, with normal info",0,null,null],["Derived key of type name: AES-GCM length: 128 using long derivedKey, empty salt, SHA-256, with normal info with bad hash name SHA256",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-GCM length: 128 using long derivedKey, empty salt, SHA-256, with normal info with missing deriveKey usage",0,null,null],["Derived key of type name: AES-GCM length: 128 using long derivedKey, empty salt, SHA-256, with normal info with wrong (ECDH) key",0,null,null],["Derived key of type name: AES-GCM length: 192 using long derivedKey, empty salt, SHA-256, with normal info",0,null,null],["Derived key of type name: AES-GCM length: 192 using long derivedKey, empty salt, SHA-256, with normal info with bad hash name SHA256",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-GCM length: 192 using long derivedKey, empty salt, SHA-256, with normal info with missing deriveKey usage",0,null,null],["Derived key of type name: AES-GCM length: 192 using long derivedKey, empty salt, SHA-256, with normal info with wrong (ECDH) key",0,null,null],["Derived key of type name: AES-GCM length: 256 using long derivedKey, empty salt, SHA-256, with normal info",0,null,null],["Derived key of type name: AES-GCM length: 256 using long derivedKey, empty salt, SHA-256, with normal info with bad hash name SHA256",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-GCM length: 256 using long derivedKey, empty salt, SHA-256, with normal info with missing deriveKey usage",0,null,null],["Derived key of type name: AES-GCM length: 256 using long derivedKey, empty salt, SHA-256, with normal info with wrong (ECDH) key",0,null,null],["Derived key of type name: AES-KW length: 128 using long derivedKey, empty salt, SHA-256, with normal info",0,null,null],["Derived key of type name: AES-KW length: 128 using long derivedKey, empty salt, SHA-256, with normal info with bad hash name SHA256",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-KW length: 128 using long derivedKey, empty salt, SHA-256, with normal info with missing deriveKey usage",0,null,null],["Derived key of type name: AES-KW length: 128 using long derivedKey, empty salt, SHA-256, with normal info with wrong (ECDH) key",0,null,null],["Derived key of type name: AES-KW length: 192 using long derivedKey, empty salt, SHA-256, with normal info",0,null,null],["Derived key of type name: AES-KW length: 192 using long derivedKey, empty salt, SHA-256, with normal info with bad hash name SHA256",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-KW length: 192 using long derivedKey, empty salt, SHA-256, with normal info with missing deriveKey usage",0,null,null],["Derived key of type name: AES-KW length: 192 using long derivedKey, empty salt, SHA-256, with normal info with wrong (ECDH) key",0,null,null],["Derived key of type name: AES-KW length: 256 using long derivedKey, empty salt, SHA-256, with normal info",0,null,null],["Derived key of type name: AES-KW length: 256 using long derivedKey, empty salt, SHA-256, with normal info with bad hash name SHA256",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-KW length: 256 using long derivedKey, empty salt, SHA-256, with normal info with missing deriveKey usage",0,null,null],["Derived key of type name: AES-KW length: 256 using long derivedKey, empty salt, SHA-256, with normal info with wrong (ECDH) key",0,null,null],["Derived key of type name: HMAC hash: SHA-1 length: 256 using long derivedKey, empty salt, SHA-256, with normal info",0,null,null],["Derived key of type name: HMAC hash: SHA-1 length: 256 using long derivedKey, empty salt, SHA-256, with normal info with bad hash name SHA256",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: HMAC hash: SHA-1 length: 256 using long derivedKey, empty salt, SHA-256, with normal info with missing deriveKey usage",0,null,null],["Derived key of type name: HMAC hash: SHA-1 length: 256 using long derivedKey, empty salt, SHA-256, with normal info with wrong (ECDH) key",0,null,null],["Derived key of type name: HMAC hash: SHA-256 length: 256 using long derivedKey, empty salt, SHA-256, with normal info",0,null,null],["Derived key of type name: HMAC hash: SHA-256 length: 256 using long derivedKey, empty salt, SHA-256, with normal info with bad hash name SHA256",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: HMAC hash: SHA-256 length: 256 using long derivedKey, empty salt, SHA-256, with normal info with missing deriveKey usage",0,null,null],["Derived key of type name: HMAC hash: SHA-256 length: 256 using long derivedKey, empty salt, SHA-256, with normal info with wrong (ECDH) key",0,null,null],["Derived key of type name: HMAC hash: SHA-384 length: 256 using long derivedKey, empty salt, SHA-256, with normal info",0,null,null],["Derived key of type name: HMAC hash: SHA-384 length: 256 using long derivedKey, empty salt, SHA-256, with normal info with bad hash name SHA256",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: HMAC hash: SHA-384 length: 256 using long derivedKey, empty salt, SHA-256, with normal info with missing deriveKey usage",0,null,null],["Derived key of type name: HMAC hash: SHA-384 length: 256 using long derivedKey, empty salt, SHA-256, with normal info with wrong (ECDH) key",0,null,null],["Derived key of type name: HMAC hash: SHA-512 length: 256 using long derivedKey, empty salt, SHA-256, with normal info",0,null,null],["Derived key of type name: HMAC hash: SHA-512 length: 256 using long derivedKey, empty salt, SHA-256, with normal info with bad hash name SHA256",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: HMAC hash: SHA-512 length: 256 using long derivedKey, empty salt, SHA-256, with normal info with missing deriveKey usage",0,null,null],["Derived key of type name: HMAC hash: SHA-512 length: 256 using long derivedKey, empty salt, SHA-256, with normal info with wrong (ECDH) key",0,null,null],["long derivedKey, empty salt, SHA-256, with normal info with missing salt",1,"assert_equals: deriveBits missing salt correctly threw OperationError: An invalid or illegal string was specified expected \"TypeError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:128:33\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:124:36\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:123:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["long derivedKey, empty salt, SHA-256, with normal info with missing info",1,"assert_equals: deriveBits missing info correctly threw OperationError: An invalid or illegal string was specified expected \"TypeError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:138:33\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:134:36\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:133:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["long derivedKey, empty salt, SHA-256, with normal info with null length",1,"assert_equals: deriveBits with null length correctly threw OperationError: Data provided to an operation does not meet requirements expected \"TypeError\" but got \"DataError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:148:33\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:144:36\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:143:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["long derivedKey, empty salt, SHA-256, with normal info with non-multiple of 8 length",1,"assert_unreached: non-multiple of 8 length should have thrown an OperationError Reached unreachable code","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:156:33\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:154:36\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:153:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["long derivedKey, empty salt, SHA-256, with normal info with bad hash name SHA256",1,"assert_equals: deriveBits with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:170:33\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:166:36\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:164:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["long derivedKey, empty salt, SHA-256, with normal info with missing deriveBits usage",0,null,null],["long derivedKey, empty salt, SHA-256, with normal info with wrong (ECDH) key",0,null,null],["long derivedKey, empty salt, SHA-256, with empty info",0,null,null],["long derivedKey, empty salt, SHA-256, with empty info with 0 length",1,"assert_equals: deriveBits with 0 length correctly threw OperationError: Data provided to an operation does not meet requirements expected \"OperationError\" but got \"DataError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:54:33\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:50:36\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:49:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-CBC length: 128 using long derivedKey, empty salt, SHA-256, with empty info",0,null,null],["Derived key of type name: AES-CBC length: 128 using long derivedKey, empty salt, SHA-256, with empty info with bad hash name SHA256",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-CBC length: 128 using long derivedKey, empty salt, SHA-256, with empty info with missing deriveKey usage",0,null,null],["Derived key of type name: AES-CBC length: 128 using long derivedKey, empty salt, SHA-256, with empty info with wrong (ECDH) key",0,null,null],["Derived key of type name: AES-CBC length: 192 using long derivedKey, empty salt, SHA-256, with empty info",0,null,null],["Derived key of type name: AES-CBC length: 192 using long derivedKey, empty salt, SHA-256, with empty info with bad hash name SHA256",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-CBC length: 192 using long derivedKey, empty salt, SHA-256, with empty info with missing deriveKey usage",0,null,null],["Derived key of type name: AES-CBC length: 192 using long derivedKey, empty salt, SHA-256, with empty info with wrong (ECDH) key",0,null,null],["Derived key of type name: AES-CBC length: 256 using long derivedKey, empty salt, SHA-256, with empty info",0,null,null],["Derived key of type name: AES-CBC length: 256 using long derivedKey, empty salt, SHA-256, with empty info with bad hash name SHA256",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-CBC length: 256 using long derivedKey, empty salt, SHA-256, with empty info with missing deriveKey usage",0,null,null],["Derived key of type name: AES-CBC length: 256 using long derivedKey, empty salt, SHA-256, with empty info with wrong (ECDH) key",0,null,null],["Derived key of type name: AES-CTR length: 128 using long derivedKey, empty salt, SHA-256, with empty info",0,null,null],["Derived key of type name: AES-CTR length: 128 using long derivedKey, empty salt, SHA-256, with empty info with bad hash name SHA256",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-CTR length: 128 using long derivedKey, empty salt, SHA-256, with empty info with missing deriveKey usage",0,null,null],["Derived key of type name: AES-CTR length: 128 using long derivedKey, empty salt, SHA-256, with empty info with wrong (ECDH) key",0,null,null],["Derived key of type name: AES-CTR length: 192 using long derivedKey, empty salt, SHA-256, with empty info",0,null,null],["Derived key of type name: AES-CTR length: 192 using long derivedKey, empty salt, SHA-256, with empty info with bad hash name SHA256",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-CTR length: 192 using long derivedKey, empty salt, SHA-256, with empty info with missing deriveKey usage",0,null,null],["Derived key of type name: AES-CTR length: 192 using long derivedKey, empty salt, SHA-256, with empty info with wrong (ECDH) key",0,null,null],["Derived key of type name: AES-CTR length: 256 using long derivedKey, empty salt, SHA-256, with empty info",0,null,null],["Derived key of type name: AES-CTR length: 256 using long derivedKey, empty salt, SHA-256, with empty info with bad hash name SHA256",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-CTR length: 256 using long derivedKey, empty salt, SHA-256, with empty info with missing deriveKey usage",0,null,null],["Derived key of type name: AES-CTR length: 256 using long derivedKey, empty salt, SHA-256, with empty info with wrong (ECDH) key",0,null,null],["Derived key of type name: AES-GCM length: 128 using long derivedKey, empty salt, SHA-256, with empty info",0,null,null],["Derived key of type name: AES-GCM length: 128 using long derivedKey, empty salt, SHA-256, with empty info with bad hash name SHA256",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-GCM length: 128 using long derivedKey, empty salt, SHA-256, with empty info with missing deriveKey usage",0,null,null],["Derived key of type name: AES-GCM length: 128 using long derivedKey, empty salt, SHA-256, with empty info with wrong (ECDH) key",0,null,null],["Derived key of type name: AES-GCM length: 192 using long derivedKey, empty salt, SHA-256, with empty info",0,null,null],["Derived key of type name: AES-GCM length: 192 using long derivedKey, empty salt, SHA-256, with empty info with bad hash name SHA256",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-GCM length: 192 using long derivedKey, empty salt, SHA-256, with empty info with missing deriveKey usage",0,null,null],["Derived key of type name: AES-GCM length: 192 using long derivedKey, empty salt, SHA-256, with empty info with wrong (ECDH) key",0,null,null],["Derived key of type name: AES-GCM length: 256 using long derivedKey, empty salt, SHA-256, with empty info",0,null,null],["Derived key of type name: AES-GCM length: 256 using long derivedKey, empty salt, SHA-256, with empty info with bad hash name SHA256",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-GCM length: 256 using long derivedKey, empty salt, SHA-256, with empty info with missing deriveKey usage",0,null,null],["Derived key of type name: AES-GCM length: 256 using long derivedKey, empty salt, SHA-256, with empty info with wrong (ECDH) key",0,null,null],["Derived key of type name: AES-KW length: 128 using long derivedKey, empty salt, SHA-256, with empty info",0,null,null],["Derived key of type name: AES-KW length: 128 using long derivedKey, empty salt, SHA-256, with empty info with bad hash name SHA256",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-KW length: 128 using long derivedKey, empty salt, SHA-256, with empty info with missing deriveKey usage",0,null,null],["Derived key of type name: AES-KW length: 128 using long derivedKey, empty salt, SHA-256, with empty info with wrong (ECDH) key",0,null,null],["Derived key of type name: AES-KW length: 192 using long derivedKey, empty salt, SHA-256, with empty info",0,null,null],["Derived key of type name: AES-KW length: 192 using long derivedKey, empty salt, SHA-256, with empty info with bad hash name SHA256",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-KW length: 192 using long derivedKey, empty salt, SHA-256, with empty info with missing deriveKey usage",0,null,null],["Derived key of type name: AES-KW length: 192 using long derivedKey, empty salt, SHA-256, with empty info with wrong (ECDH) key",0,null,null],["Derived key of type name: AES-KW length: 256 using long derivedKey, empty salt, SHA-256, with empty info",0,null,null],["Derived key of type name: AES-KW length: 256 using long derivedKey, empty salt, SHA-256, with empty info with bad hash name SHA256",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-KW length: 256 using long derivedKey, empty salt, SHA-256, with empty info with missing deriveKey usage",0,null,null],["Derived key of type name: AES-KW length: 256 using long derivedKey, empty salt, SHA-256, with empty info with wrong (ECDH) key",0,null,null],["Derived key of type name: HMAC hash: SHA-1 length: 256 using long derivedKey, empty salt, SHA-256, with empty info",0,null,null],["Derived key of type name: HMAC hash: SHA-1 length: 256 using long derivedKey, empty salt, SHA-256, with empty info with bad hash name SHA256",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: HMAC hash: SHA-1 length: 256 using long derivedKey, empty salt, SHA-256, with empty info with missing deriveKey usage",0,null,null],["Derived key of type name: HMAC hash: SHA-1 length: 256 using long derivedKey, empty salt, SHA-256, with empty info with wrong (ECDH) key",0,null,null],["Derived key of type name: HMAC hash: SHA-256 length: 256 using long derivedKey, empty salt, SHA-256, with empty info",0,null,null],["Derived key of type name: HMAC hash: SHA-256 length: 256 using long derivedKey, empty salt, SHA-256, with empty info with bad hash name SHA256",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: HMAC hash: SHA-256 length: 256 using long derivedKey, empty salt, SHA-256, with empty info with missing deriveKey usage",0,null,null],["Derived key of type name: HMAC hash: SHA-256 length: 256 using long derivedKey, empty salt, SHA-256, with empty info with wrong (ECDH) key",0,null,null],["Derived key of type name: HMAC hash: SHA-384 length: 256 using long derivedKey, empty salt, SHA-256, with empty info",0,null,null],["Derived key of type name: HMAC hash: SHA-384 length: 256 using long derivedKey, empty salt, SHA-256, with empty info with bad hash name SHA256",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: HMAC hash: SHA-384 length: 256 using long derivedKey, empty salt, SHA-256, with empty info with missing deriveKey usage",0,null,null],["Derived key of type name: HMAC hash: SHA-384 length: 256 using long derivedKey, empty salt, SHA-256, with empty info with wrong (ECDH) key",0,null,null],["Derived key of type name: HMAC hash: SHA-512 length: 256 using long derivedKey, empty salt, SHA-256, with empty info",0,null,null],["Derived key of type name: HMAC hash: SHA-512 length: 256 using long derivedKey, empty salt, SHA-256, with empty info with bad hash name SHA256",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: HMAC hash: SHA-512 length: 256 using long derivedKey, empty salt, SHA-256, with empty info with missing deriveKey usage",0,null,null],["Derived key of type name: HMAC hash: SHA-512 length: 256 using long derivedKey, empty salt, SHA-256, with empty info with wrong (ECDH) key",0,null,null],["long derivedKey, empty salt, SHA-256, with empty info with missing salt",1,"assert_equals: deriveBits missing salt correctly threw OperationError: An invalid or illegal string was specified expected \"TypeError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:128:33\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:124:36\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:123:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["long derivedKey, empty salt, SHA-256, with empty info with missing info",1,"assert_equals: deriveBits missing info correctly threw OperationError: An invalid or illegal string was specified expected \"TypeError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:138:33\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:134:36\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:133:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["long derivedKey, empty salt, SHA-256, with empty info with null length",1,"assert_equals: deriveBits with null length correctly threw OperationError: Data provided to an operation does not meet requirements expected \"TypeError\" but got \"DataError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:148:33\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:144:36\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:143:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["long derivedKey, empty salt, SHA-256, with empty info with non-multiple of 8 length",1,"assert_unreached: non-multiple of 8 length should have thrown an OperationError Reached unreachable code","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:156:33\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:154:36\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:153:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["long derivedKey, empty salt, SHA-256, with empty info with bad hash name SHA256",1,"assert_equals: deriveBits with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:170:33\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:166:36\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:164:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["long derivedKey, empty salt, SHA-256, with empty info with missing deriveBits usage",0,null,null],["long derivedKey, empty salt, SHA-256, with empty info with wrong (ECDH) key",0,null,null],["long derivedKey, empty salt, PBKDF2, with normal info with non-digest algorithm PBKDF2",0,null,null],["Derived key of type name: AES-CBC length: 128 using long derivedKey, empty salt, PBKDF2, with normal info",0,null,null],["Derived key of type name: AES-CBC length: 192 using long derivedKey, empty salt, PBKDF2, with normal info",0,null,null],["Derived key of type name: AES-CBC length: 256 using long derivedKey, empty salt, PBKDF2, with normal info",0,null,null],["Derived key of type name: AES-CTR length: 128 using long derivedKey, empty salt, PBKDF2, with normal info",0,null,null],["Derived key of type name: AES-CTR length: 192 using long derivedKey, empty salt, PBKDF2, with normal info",0,null,null],["Derived key of type name: AES-CTR length: 256 using long derivedKey, empty salt, PBKDF2, with normal info",0,null,null],["Derived key of type name: AES-GCM length: 128 using long derivedKey, empty salt, PBKDF2, with normal info",0,null,null],["Derived key of type name: AES-GCM length: 192 using long derivedKey, empty salt, PBKDF2, with normal info",0,null,null],["Derived key of type name: AES-GCM length: 256 using long derivedKey, empty salt, PBKDF2, with normal info",0,null,null],["Derived key of type name: AES-KW length: 128 using long derivedKey, empty salt, PBKDF2, with normal info",0,null,null],["Derived key of type name: AES-KW length: 192 using long derivedKey, empty salt, PBKDF2, with normal info",0,null,null],["Derived key of type name: AES-KW length: 256 using long derivedKey, empty salt, PBKDF2, with normal info",0,null,null],["Derived key of type name: HMAC hash: SHA-1 length: 256 using long derivedKey, empty salt, PBKDF2, with normal info",0,null,null],["Derived key of type name: HMAC hash: SHA-256 length: 256 using long derivedKey, empty salt, PBKDF2, with normal info",0,null,null],["Derived key of type name: HMAC hash: SHA-384 length: 256 using long derivedKey, empty salt, PBKDF2, with normal info",0,null,null],["Derived key of type name: HMAC hash: SHA-512 length: 256 using long derivedKey, empty salt, PBKDF2, with normal info",0,null,null],["long derivedKey, empty salt, PBKDF2, with empty info with non-digest algorithm PBKDF2",0,null,null],["Derived key of type name: AES-CBC length: 128 using long derivedKey, empty salt, PBKDF2, with empty info",0,null,null],["Derived key of type name: AES-CBC length: 192 using long derivedKey, empty salt, PBKDF2, with empty info",0,null,null],["Derived key of type name: AES-CBC length: 256 using long derivedKey, empty salt, PBKDF2, with empty info",0,null,null],["Derived key of type name: AES-CTR length: 128 using long derivedKey, empty salt, PBKDF2, with empty info",0,null,null],["Derived key of type name: AES-CTR length: 192 using long derivedKey, empty salt, PBKDF2, with empty info",0,null,null],["Derived key of type name: AES-CTR length: 256 using long derivedKey, empty salt, PBKDF2, with empty info",0,null,null],["Derived key of type name: AES-GCM length: 128 using long derivedKey, empty salt, PBKDF2, with empty info",0,null,null],["Derived key of type name: AES-GCM length: 192 using long derivedKey, empty salt, PBKDF2, with empty info",0,null,null],["Derived key of type name: AES-GCM length: 256 using long derivedKey, empty salt, PBKDF2, with empty info",0,null,null],["Derived key of type name: AES-KW length: 128 using long derivedKey, empty salt, PBKDF2, with empty info",0,null,null],["Derived key of type name: AES-KW length: 192 using long derivedKey, empty salt, PBKDF2, with empty info",0,null,null],["Derived key of type name: AES-KW length: 256 using long derivedKey, empty salt, PBKDF2, with empty info",0,null,null],["Derived key of type name: HMAC hash: SHA-1 length: 256 using long derivedKey, empty salt, PBKDF2, with empty info",0,null,null],["Derived key of type name: HMAC hash: SHA-256 length: 256 using long derivedKey, empty salt, PBKDF2, with empty info",0,null,null],["Derived key of type name: HMAC hash: SHA-384 length: 256 using long derivedKey, empty salt, PBKDF2, with empty info",0,null,null],["Derived key of type name: HMAC hash: SHA-512 length: 256 using long derivedKey, empty salt, PBKDF2, with empty info",0,null,null],["empty derivedKey, normal salt, SHA-384, with normal info",1,"assert_unreached: deriveBits failed with error TypeError: Argument 2 of SubtleCrypto.deriveBits is not an object. Reached unreachable code","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:44:33\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:40:36\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:39:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["empty derivedKey, normal salt, SHA-384, with normal info with 0 length",1,"assert_equals: deriveBits with 0 length correctly threw OperationError: Argument 2 of SubtleCrypto.deriveBits is not an object. expected \"OperationError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:54:33\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:50:36\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:49:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-CBC length: 128 using empty derivedKey, normal salt, SHA-384, with normal info",1,"assert_unreached: deriveKey failed with error TypeError: Argument 2 of SubtleCrypto.deriveKey is not an object. Reached unreachable code","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:79:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:69:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:68:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-CBC length: 128 using empty derivedKey, normal salt, SHA-384, with normal info with bad hash name SHA384",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"NotSupportedError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-CBC length: 128 using empty derivedKey, normal salt, SHA-384, with normal info with missing deriveKey usage",1,"assert_equals: deriveKey with missing deriveKey usage correctly threw InvalidAccessError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"InvalidAccessError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:104:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:100:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:99:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-CBC length: 128 using empty derivedKey, normal salt, SHA-384, with normal info with wrong (ECDH) key",0,null,null],["Derived key of type name: AES-CBC length: 192 using empty derivedKey, normal salt, SHA-384, with normal info",1,"assert_unreached: deriveKey failed with error TypeError: Argument 2 of SubtleCrypto.deriveKey is not an object. Reached unreachable code","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:79:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:69:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:68:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-CBC length: 192 using empty derivedKey, normal salt, SHA-384, with normal info with bad hash name SHA384",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"NotSupportedError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-CBC length: 192 using empty derivedKey, normal salt, SHA-384, with normal info with missing deriveKey usage",1,"assert_equals: deriveKey with missing deriveKey usage correctly threw InvalidAccessError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"InvalidAccessError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:104:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:100:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:99:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-CBC length: 192 using empty derivedKey, normal salt, SHA-384, with normal info with wrong (ECDH) key",0,null,null],["Derived key of type name: AES-CBC length: 256 using empty derivedKey, normal salt, SHA-384, with normal info",1,"assert_unreached: deriveKey failed with error TypeError: Argument 2 of SubtleCrypto.deriveKey is not an object. Reached unreachable code","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:79:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:69:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:68:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-CBC length: 256 using empty derivedKey, normal salt, SHA-384, with normal info with bad hash name SHA384",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"NotSupportedError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-CBC length: 256 using empty derivedKey, normal salt, SHA-384, with normal info with missing deriveKey usage",1,"assert_equals: deriveKey with missing deriveKey usage correctly threw InvalidAccessError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"InvalidAccessError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:104:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:100:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:99:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-CBC length: 256 using empty derivedKey, normal salt, SHA-384, with normal info with wrong (ECDH) key",0,null,null],["Derived key of type name: AES-CTR length: 128 using empty derivedKey, normal salt, SHA-384, with normal info",1,"assert_unreached: deriveKey failed with error TypeError: Argument 2 of SubtleCrypto.deriveKey is not an object. Reached unreachable code","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:79:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:69:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:68:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-CTR length: 128 using empty derivedKey, normal salt, SHA-384, with normal info with bad hash name SHA384",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"NotSupportedError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-CTR length: 128 using empty derivedKey, normal salt, SHA-384, with normal info with missing deriveKey usage",1,"assert_equals: deriveKey with missing deriveKey usage correctly threw InvalidAccessError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"InvalidAccessError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:104:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:100:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:99:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-CTR length: 128 using empty derivedKey, normal salt, SHA-384, with normal info with wrong (ECDH) key",0,null,null],["Derived key of type name: AES-CTR length: 192 using empty derivedKey, normal salt, SHA-384, with normal info",1,"assert_unreached: deriveKey failed with error TypeError: Argument 2 of SubtleCrypto.deriveKey is not an object. Reached unreachable code","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:79:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:69:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:68:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-CTR length: 192 using empty derivedKey, normal salt, SHA-384, with normal info with bad hash name SHA384",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"NotSupportedError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-CTR length: 192 using empty derivedKey, normal salt, SHA-384, with normal info with missing deriveKey usage",1,"assert_equals: deriveKey with missing deriveKey usage correctly threw InvalidAccessError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"InvalidAccessError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:104:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:100:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:99:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-CTR length: 192 using empty derivedKey, normal salt, SHA-384, with normal info with wrong (ECDH) key",0,null,null],["Derived key of type name: AES-CTR length: 256 using empty derivedKey, normal salt, SHA-384, with normal info",1,"assert_unreached: deriveKey failed with error TypeError: Argument 2 of SubtleCrypto.deriveKey is not an object. Reached unreachable code","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:79:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:69:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:68:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-CTR length: 256 using empty derivedKey, normal salt, SHA-384, with normal info with bad hash name SHA384",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"NotSupportedError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-CTR length: 256 using empty derivedKey, normal salt, SHA-384, with normal info with missing deriveKey usage",1,"assert_equals: deriveKey with missing deriveKey usage correctly threw InvalidAccessError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"InvalidAccessError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:104:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:100:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:99:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-CTR length: 256 using empty derivedKey, normal salt, SHA-384, with normal info with wrong (ECDH) key",0,null,null],["Derived key of type name: AES-GCM length: 128 using empty derivedKey, normal salt, SHA-384, with normal info",1,"assert_unreached: deriveKey failed with error TypeError: Argument 2 of SubtleCrypto.deriveKey is not an object. Reached unreachable code","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:79:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:69:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:68:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-GCM length: 128 using empty derivedKey, normal salt, SHA-384, with normal info with bad hash name SHA384",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"NotSupportedError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-GCM length: 128 using empty derivedKey, normal salt, SHA-384, with normal info with missing deriveKey usage",1,"assert_equals: deriveKey with missing deriveKey usage correctly threw InvalidAccessError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"InvalidAccessError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:104:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:100:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:99:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-GCM length: 128 using empty derivedKey, normal salt, SHA-384, with normal info with wrong (ECDH) key",0,null,null],["Derived key of type name: AES-GCM length: 192 using empty derivedKey, normal salt, SHA-384, with normal info",1,"assert_unreached: deriveKey failed with error TypeError: Argument 2 of SubtleCrypto.deriveKey is not an object. Reached unreachable code","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:79:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:69:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:68:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-GCM length: 192 using empty derivedKey, normal salt, SHA-384, with normal info with bad hash name SHA384",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"NotSupportedError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-GCM length: 192 using empty derivedKey, normal salt, SHA-384, with normal info with missing deriveKey usage",1,"assert_equals: deriveKey with missing deriveKey usage correctly threw InvalidAccessError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"InvalidAccessError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:104:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:100:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:99:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-GCM length: 192 using empty derivedKey, normal salt, SHA-384, with normal info with wrong (ECDH) key",0,null,null],["Derived key of type name: AES-GCM length: 256 using empty derivedKey, normal salt, SHA-384, with normal info",1,"assert_unreached: deriveKey failed with error TypeError: Argument 2 of SubtleCrypto.deriveKey is not an object. Reached unreachable code","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:79:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:69:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:68:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-GCM length: 256 using empty derivedKey, normal salt, SHA-384, with normal info with bad hash name SHA384",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"NotSupportedError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-GCM length: 256 using empty derivedKey, normal salt, SHA-384, with normal info with missing deriveKey usage",1,"assert_equals: deriveKey with missing deriveKey usage correctly threw InvalidAccessError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"InvalidAccessError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:104:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:100:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:99:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-GCM length: 256 using empty derivedKey, normal salt, SHA-384, with normal info with wrong (ECDH) key",0,null,null],["Derived key of type name: AES-KW length: 128 using empty derivedKey, normal salt, SHA-384, with normal info",1,"assert_unreached: deriveKey failed with error TypeError: Argument 2 of SubtleCrypto.deriveKey is not an object. Reached unreachable code","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:79:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:69:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:68:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-KW length: 128 using empty derivedKey, normal salt, SHA-384, with normal info with bad hash name SHA384",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"NotSupportedError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-KW length: 128 using empty derivedKey, normal salt, SHA-384, with normal info with missing deriveKey usage",1,"assert_equals: deriveKey with missing deriveKey usage correctly threw InvalidAccessError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"InvalidAccessError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:104:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:100:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:99:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-KW length: 128 using empty derivedKey, normal salt, SHA-384, with normal info with wrong (ECDH) key",0,null,null],["Derived key of type name: AES-KW length: 192 using empty derivedKey, normal salt, SHA-384, with normal info",1,"assert_unreached: deriveKey failed with error TypeError: Argument 2 of SubtleCrypto.deriveKey is not an object. Reached unreachable code","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:79:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:69:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:68:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-KW length: 192 using empty derivedKey, normal salt, SHA-384, with normal info with bad hash name SHA384",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"NotSupportedError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-KW length: 192 using empty derivedKey, normal salt, SHA-384, with normal info with missing deriveKey usage",1,"assert_equals: deriveKey with missing deriveKey usage correctly threw InvalidAccessError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"InvalidAccessError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:104:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:100:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:99:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-KW length: 192 using empty derivedKey, normal salt, SHA-384, with normal info with wrong (ECDH) key",0,null,null],["Derived key of type name: AES-KW length: 256 using empty derivedKey, normal salt, SHA-384, with normal info",1,"assert_unreached: deriveKey failed with error TypeError: Argument 2 of SubtleCrypto.deriveKey is not an object. Reached unreachable code","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:79:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:69:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:68:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-KW length: 256 using empty derivedKey, normal salt, SHA-384, with normal info with bad hash name SHA384",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"NotSupportedError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-KW length: 256 using empty derivedKey, normal salt, SHA-384, with normal info with missing deriveKey usage",1,"assert_equals: deriveKey with missing deriveKey usage correctly threw InvalidAccessError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"InvalidAccessError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:104:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:100:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:99:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-KW length: 256 using empty derivedKey, normal salt, SHA-384, with normal info with wrong (ECDH) key",0,null,null],["Derived key of type name: HMAC hash: SHA-1 length: 256 using empty derivedKey, normal salt, SHA-384, with normal info",1,"assert_unreached: deriveKey failed with error TypeError: Argument 2 of SubtleCrypto.deriveKey is not an object. Reached unreachable code","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:79:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:69:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:68:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: HMAC hash: SHA-1 length: 256 using empty derivedKey, normal salt, SHA-384, with normal info with bad hash name SHA384",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"NotSupportedError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: HMAC hash: SHA-1 length: 256 using empty derivedKey, normal salt, SHA-384, with normal info with missing deriveKey usage",1,"assert_equals: deriveKey with missing deriveKey usage correctly threw InvalidAccessError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"InvalidAccessError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:104:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:100:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:99:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: HMAC hash: SHA-1 length: 256 using empty derivedKey, normal salt, SHA-384, with normal info with wrong (ECDH) key",0,null,null],["Derived key of type name: HMAC hash: SHA-256 length: 256 using empty derivedKey, normal salt, SHA-384, with normal info",1,"assert_unreached: deriveKey failed with error TypeError: Argument 2 of SubtleCrypto.deriveKey is not an object. Reached unreachable code","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:79:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:69:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:68:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: HMAC hash: SHA-256 length: 256 using empty derivedKey, normal salt, SHA-384, with normal info with bad hash name SHA384",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"NotSupportedError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: HMAC hash: SHA-256 length: 256 using empty derivedKey, normal salt, SHA-384, with normal info with missing deriveKey usage",1,"assert_equals: deriveKey with missing deriveKey usage correctly threw InvalidAccessError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"InvalidAccessError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:104:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:100:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:99:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: HMAC hash: SHA-256 length: 256 using empty derivedKey, normal salt, SHA-384, with normal info with wrong (ECDH) key",0,null,null],["Derived key of type name: HMAC hash: SHA-384 length: 256 using empty derivedKey, normal salt, SHA-384, with normal info",1,"assert_unreached: deriveKey failed with error TypeError: Argument 2 of SubtleCrypto.deriveKey is not an object. Reached unreachable code","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:79:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:69:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:68:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: HMAC hash: SHA-384 length: 256 using empty derivedKey, normal salt, SHA-384, with normal info with bad hash name SHA384",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"NotSupportedError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: HMAC hash: SHA-384 length: 256 using empty derivedKey, normal salt, SHA-384, with normal info with missing deriveKey usage",1,"assert_equals: deriveKey with missing deriveKey usage correctly threw InvalidAccessError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"InvalidAccessError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:104:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:100:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:99:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: HMAC hash: SHA-384 length: 256 using empty derivedKey, normal salt, SHA-384, with normal info with wrong (ECDH) key",0,null,null],["Derived key of type name: HMAC hash: SHA-512 length: 256 using empty derivedKey, normal salt, SHA-384, with normal info",1,"assert_unreached: deriveKey failed with error TypeError: Argument 2 of SubtleCrypto.deriveKey is not an object. Reached unreachable code","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:79:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:69:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:68:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: HMAC hash: SHA-512 length: 256 using empty derivedKey, normal salt, SHA-384, with normal info with bad hash name SHA384",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"NotSupportedError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: HMAC hash: SHA-512 length: 256 using empty derivedKey, normal salt, SHA-384, with normal info with missing deriveKey usage",1,"assert_equals: deriveKey with missing deriveKey usage correctly threw InvalidAccessError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"InvalidAccessError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:104:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:100:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:99:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: HMAC hash: SHA-512 length: 256 using empty derivedKey, normal salt, SHA-384, with normal info with wrong (ECDH) key",0,null,null],["empty derivedKey, normal salt, SHA-384, with normal info with missing salt",0,null,null],["empty derivedKey, normal salt, SHA-384, with normal info with missing info",0,null,null],["empty derivedKey, normal salt, SHA-384, with normal info with null length",0,null,null],["empty derivedKey, normal salt, SHA-384, with normal info with non-multiple of 8 length",1,"assert_equals: deriveBits with non-multiple of 8 length correctly threw OperationError: Argument 2 of SubtleCrypto.deriveBits is not an object. expected \"OperationError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:158:33\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:154:36\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:153:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["empty derivedKey, normal salt, SHA-384, with normal info with bad hash name SHA384",1,"assert_equals: deriveBits with bad hash name correctly threw NotSupportedError: Argument 2 of SubtleCrypto.deriveBits is not an object. expected \"NotSupportedError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:170:33\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:166:36\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:164:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["empty derivedKey, normal salt, SHA-384, with normal info with missing deriveBits usage",1,"assert_equals: deriveBits with missing deriveBits usage correctly threw InvalidAccessError: Argument 2 of SubtleCrypto.deriveBits is not an object. expected \"InvalidAccessError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:180:33\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:176:36\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:175:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["empty derivedKey, normal salt, SHA-384, with normal info with wrong (ECDH) key",0,null,null],["empty derivedKey, normal salt, SHA-384, with empty info",1,"assert_unreached: deriveBits failed with error TypeError: Argument 2 of SubtleCrypto.deriveBits is not an object. Reached unreachable code","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:44:33\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:40:36\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:39:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["empty derivedKey, normal salt, SHA-384, with empty info with 0 length",1,"assert_equals: deriveBits with 0 length correctly threw OperationError: Argument 2 of SubtleCrypto.deriveBits is not an object. expected \"OperationError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:54:33\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:50:36\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:49:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-CBC length: 128 using empty derivedKey, normal salt, SHA-384, with empty info",1,"assert_unreached: deriveKey failed with error TypeError: Argument 2 of SubtleCrypto.deriveKey is not an object. Reached unreachable code","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:79:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:69:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:68:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-CBC length: 128 using empty derivedKey, normal salt, SHA-384, with empty info with bad hash name SHA384",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"NotSupportedError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-CBC length: 128 using empty derivedKey, normal salt, SHA-384, with empty info with missing deriveKey usage",1,"assert_equals: deriveKey with missing deriveKey usage correctly threw InvalidAccessError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"InvalidAccessError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:104:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:100:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:99:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-CBC length: 128 using empty derivedKey, normal salt, SHA-384, with empty info with wrong (ECDH) key",0,null,null],["Derived key of type name: AES-CBC length: 192 using empty derivedKey, normal salt, SHA-384, with empty info",1,"assert_unreached: deriveKey failed with error TypeError: Argument 2 of SubtleCrypto.deriveKey is not an object. Reached unreachable code","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:79:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:69:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:68:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-CBC length: 192 using empty derivedKey, normal salt, SHA-384, with empty info with bad hash name SHA384",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"NotSupportedError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-CBC length: 192 using empty derivedKey, normal salt, SHA-384, with empty info with missing deriveKey usage",1,"assert_equals: deriveKey with missing deriveKey usage correctly threw InvalidAccessError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"InvalidAccessError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:104:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:100:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:99:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-CBC length: 192 using empty derivedKey, normal salt, SHA-384, with empty info with wrong (ECDH) key",0,null,null],["Derived key of type name: AES-CBC length: 256 using empty derivedKey, normal salt, SHA-384, with empty info",1,"assert_unreached: deriveKey failed with error TypeError: Argument 2 of SubtleCrypto.deriveKey is not an object. Reached unreachable code","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:79:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:69:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:68:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-CBC length: 256 using empty derivedKey, normal salt, SHA-384, with empty info with bad hash name SHA384",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"NotSupportedError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-CBC length: 256 using empty derivedKey, normal salt, SHA-384, with empty info with missing deriveKey usage",1,"assert_equals: deriveKey with missing deriveKey usage correctly threw InvalidAccessError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"InvalidAccessError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:104:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:100:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:99:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-CBC length: 256 using empty derivedKey, normal salt, SHA-384, with empty info with wrong (ECDH) key",0,null,null],["Derived key of type name: AES-CTR length: 128 using empty derivedKey, normal salt, SHA-384, with empty info",1,"assert_unreached: deriveKey failed with error TypeError: Argument 2 of SubtleCrypto.deriveKey is not an object. Reached unreachable code","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:79:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:69:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:68:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-CTR length: 128 using empty derivedKey, normal salt, SHA-384, with empty info with bad hash name SHA384",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"NotSupportedError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-CTR length: 128 using empty derivedKey, normal salt, SHA-384, with empty info with missing deriveKey usage",1,"assert_equals: deriveKey with missing deriveKey usage correctly threw InvalidAccessError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"InvalidAccessError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:104:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:100:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:99:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-CTR length: 128 using empty derivedKey, normal salt, SHA-384, with empty info with wrong (ECDH) key",0,null,null],["Derived key of type name: AES-CTR length: 192 using empty derivedKey, normal salt, SHA-384, with empty info",1,"assert_unreached: deriveKey failed with error TypeError: Argument 2 of SubtleCrypto.deriveKey is not an object. Reached unreachable code","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:79:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:69:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:68:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-CTR length: 192 using empty derivedKey, normal salt, SHA-384, with empty info with bad hash name SHA384",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"NotSupportedError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-CTR length: 192 using empty derivedKey, normal salt, SHA-384, with empty info with missing deriveKey usage",1,"assert_equals: deriveKey with missing deriveKey usage correctly threw InvalidAccessError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"InvalidAccessError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:104:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:100:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:99:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-CTR length: 192 using empty derivedKey, normal salt, SHA-384, with empty info with wrong (ECDH) key",0,null,null],["Derived key of type name: AES-CTR length: 256 using empty derivedKey, normal salt, SHA-384, with empty info",1,"assert_unreached: deriveKey failed with error TypeError: Argument 2 of SubtleCrypto.deriveKey is not an object. Reached unreachable code","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:79:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:69:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:68:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-CTR length: 256 using empty derivedKey, normal salt, SHA-384, with empty info with bad hash name SHA384",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"NotSupportedError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-CTR length: 256 using empty derivedKey, normal salt, SHA-384, with empty info with missing deriveKey usage",1,"assert_equals: deriveKey with missing deriveKey usage correctly threw InvalidAccessError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"InvalidAccessError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:104:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:100:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:99:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-CTR length: 256 using empty derivedKey, normal salt, SHA-384, with empty info with wrong (ECDH) key",0,null,null],["Derived key of type name: AES-GCM length: 128 using empty derivedKey, normal salt, SHA-384, with empty info",1,"assert_unreached: deriveKey failed with error TypeError: Argument 2 of SubtleCrypto.deriveKey is not an object. Reached unreachable code","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:79:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:69:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:68:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-GCM length: 128 using empty derivedKey, normal salt, SHA-384, with empty info with bad hash name SHA384",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"NotSupportedError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-GCM length: 128 using empty derivedKey, normal salt, SHA-384, with empty info with missing deriveKey usage",1,"assert_equals: deriveKey with missing deriveKey usage correctly threw InvalidAccessError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"InvalidAccessError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:104:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:100:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:99:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-GCM length: 128 using empty derivedKey, normal salt, SHA-384, with empty info with wrong (ECDH) key",0,null,null],["Derived key of type name: AES-GCM length: 192 using empty derivedKey, normal salt, SHA-384, with empty info",1,"assert_unreached: deriveKey failed with error TypeError: Argument 2 of SubtleCrypto.deriveKey is not an object. Reached unreachable code","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:79:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:69:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:68:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-GCM length: 192 using empty derivedKey, normal salt, SHA-384, with empty info with bad hash name SHA384",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"NotSupportedError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-GCM length: 192 using empty derivedKey, normal salt, SHA-384, with empty info with missing deriveKey usage",1,"assert_equals: deriveKey with missing deriveKey usage correctly threw InvalidAccessError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"InvalidAccessError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:104:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:100:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:99:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-GCM length: 192 using empty derivedKey, normal salt, SHA-384, with empty info with wrong (ECDH) key",0,null,null],["Derived key of type name: AES-GCM length: 256 using empty derivedKey, normal salt, SHA-384, with empty info",1,"assert_unreached: deriveKey failed with error TypeError: Argument 2 of SubtleCrypto.deriveKey is not an object. Reached unreachable code","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:79:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:69:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:68:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-GCM length: 256 using empty derivedKey, normal salt, SHA-384, with empty info with bad hash name SHA384",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"NotSupportedError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-GCM length: 256 using empty derivedKey, normal salt, SHA-384, with empty info with missing deriveKey usage",1,"assert_equals: deriveKey with missing deriveKey usage correctly threw InvalidAccessError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"InvalidAccessError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:104:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:100:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:99:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-GCM length: 256 using empty derivedKey, normal salt, SHA-384, with empty info with wrong (ECDH) key",0,null,null],["Derived key of type name: AES-KW length: 128 using empty derivedKey, normal salt, SHA-384, with empty info",1,"assert_unreached: deriveKey failed with error TypeError: Argument 2 of SubtleCrypto.deriveKey is not an object. Reached unreachable code","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:79:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:69:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:68:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-KW length: 128 using empty derivedKey, normal salt, SHA-384, with empty info with bad hash name SHA384",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"NotSupportedError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-KW length: 128 using empty derivedKey, normal salt, SHA-384, with empty info with missing deriveKey usage",1,"assert_equals: deriveKey with missing deriveKey usage correctly threw InvalidAccessError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"InvalidAccessError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:104:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:100:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:99:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-KW length: 128 using empty derivedKey, normal salt, SHA-384, with empty info with wrong (ECDH) key",0,null,null],["Derived key of type name: AES-KW length: 192 using empty derivedKey, normal salt, SHA-384, with empty info",1,"assert_unreached: deriveKey failed with error TypeError: Argument 2 of SubtleCrypto.deriveKey is not an object. Reached unreachable code","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:79:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:69:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:68:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-KW length: 192 using empty derivedKey, normal salt, SHA-384, with empty info with bad hash name SHA384",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"NotSupportedError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-KW length: 192 using empty derivedKey, normal salt, SHA-384, with empty info with missing deriveKey usage",1,"assert_equals: deriveKey with missing deriveKey usage correctly threw InvalidAccessError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"InvalidAccessError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:104:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:100:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:99:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-KW length: 192 using empty derivedKey, normal salt, SHA-384, with empty info with wrong (ECDH) key",0,null,null],["Derived key of type name: AES-KW length: 256 using empty derivedKey, normal salt, SHA-384, with empty info",1,"assert_unreached: deriveKey failed with error TypeError: Argument 2 of SubtleCrypto.deriveKey is not an object. Reached unreachable code","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:79:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:69:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:68:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-KW length: 256 using empty derivedKey, normal salt, SHA-384, with empty info with bad hash name SHA384",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"NotSupportedError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-KW length: 256 using empty derivedKey, normal salt, SHA-384, with empty info with missing deriveKey usage",1,"assert_equals: deriveKey with missing deriveKey usage correctly threw InvalidAccessError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"InvalidAccessError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:104:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:100:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:99:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-KW length: 256 using empty derivedKey, normal salt, SHA-384, with empty info with wrong (ECDH) key",0,null,null],["Derived key of type name: HMAC hash: SHA-1 length: 256 using empty derivedKey, normal salt, SHA-384, with empty info",1,"assert_unreached: deriveKey failed with error TypeError: Argument 2 of SubtleCrypto.deriveKey is not an object. Reached unreachable code","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:79:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:69:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:68:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: HMAC hash: SHA-1 length: 256 using empty derivedKey, normal salt, SHA-384, with empty info with bad hash name SHA384",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"NotSupportedError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: HMAC hash: SHA-1 length: 256 using empty derivedKey, normal salt, SHA-384, with empty info with missing deriveKey usage",1,"assert_equals: deriveKey with missing deriveKey usage correctly threw InvalidAccessError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"InvalidAccessError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:104:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:100:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:99:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: HMAC hash: SHA-1 length: 256 using empty derivedKey, normal salt, SHA-384, with empty info with wrong (ECDH) key",0,null,null],["Derived key of type name: HMAC hash: SHA-256 length: 256 using empty derivedKey, normal salt, SHA-384, with empty info",1,"assert_unreached: deriveKey failed with error TypeError: Argument 2 of SubtleCrypto.deriveKey is not an object. Reached unreachable code","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:79:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:69:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:68:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: HMAC hash: SHA-256 length: 256 using empty derivedKey, normal salt, SHA-384, with empty info with bad hash name SHA384",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"NotSupportedError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: HMAC hash: SHA-256 length: 256 using empty derivedKey, normal salt, SHA-384, with empty info with missing deriveKey usage",1,"assert_equals: deriveKey with missing deriveKey usage correctly threw InvalidAccessError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"InvalidAccessError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:104:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:100:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:99:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: HMAC hash: SHA-256 length: 256 using empty derivedKey, normal salt, SHA-384, with empty info with wrong (ECDH) key",0,null,null],["Derived key of type name: HMAC hash: SHA-384 length: 256 using empty derivedKey, normal salt, SHA-384, with empty info",1,"assert_unreached: deriveKey failed with error TypeError: Argument 2 of SubtleCrypto.deriveKey is not an object. Reached unreachable code","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:79:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:69:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:68:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: HMAC hash: SHA-384 length: 256 using empty derivedKey, normal salt, SHA-384, with empty info with bad hash name SHA384",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"NotSupportedError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: HMAC hash: SHA-384 length: 256 using empty derivedKey, normal salt, SHA-384, with empty info with missing deriveKey usage",1,"assert_equals: deriveKey with missing deriveKey usage correctly threw InvalidAccessError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"InvalidAccessError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:104:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:100:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:99:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: HMAC hash: SHA-384 length: 256 using empty derivedKey, normal salt, SHA-384, with empty info with wrong (ECDH) key",0,null,null],["Derived key of type name: HMAC hash: SHA-512 length: 256 using empty derivedKey, normal salt, SHA-384, with empty info",1,"assert_unreached: deriveKey failed with error TypeError: Argument 2 of SubtleCrypto.deriveKey is not an object. Reached unreachable code","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:79:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:69:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:68:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: HMAC hash: SHA-512 length: 256 using empty derivedKey, normal salt, SHA-384, with empty info with bad hash name SHA384",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"NotSupportedError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: HMAC hash: SHA-512 length: 256 using empty derivedKey, normal salt, SHA-384, with empty info with missing deriveKey usage",1,"assert_equals: deriveKey with missing deriveKey usage correctly threw InvalidAccessError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"InvalidAccessError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:104:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:100:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:99:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: HMAC hash: SHA-512 length: 256 using empty derivedKey, normal salt, SHA-384, with empty info with wrong (ECDH) key",0,null,null],["empty derivedKey, normal salt, SHA-384, with empty info with missing salt",0,null,null],["empty derivedKey, normal salt, SHA-384, with empty info with missing info",0,null,null],["empty derivedKey, normal salt, SHA-384, with empty info with null length",0,null,null],["empty derivedKey, normal salt, SHA-384, with empty info with non-multiple of 8 length",1,"assert_equals: deriveBits with non-multiple of 8 length correctly threw OperationError: Argument 2 of SubtleCrypto.deriveBits is not an object. expected \"OperationError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:158:33\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:154:36\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:153:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["empty derivedKey, normal salt, SHA-384, with empty info with bad hash name SHA384",1,"assert_equals: deriveBits with bad hash name correctly threw NotSupportedError: Argument 2 of SubtleCrypto.deriveBits is not an object. expected \"NotSupportedError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:170:33\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:166:36\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:164:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["empty derivedKey, normal salt, SHA-384, with empty info with missing deriveBits usage",1,"assert_equals: deriveBits with missing deriveBits usage correctly threw InvalidAccessError: Argument 2 of SubtleCrypto.deriveBits is not an object. expected \"InvalidAccessError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:180:33\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:176:36\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:175:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["empty derivedKey, normal salt, SHA-384, with empty info with wrong (ECDH) key",0,null,null],["empty derivedKey, normal salt, SHA-512, with normal info",1,"assert_unreached: deriveBits failed with error TypeError: Argument 2 of SubtleCrypto.deriveBits is not an object. Reached unreachable code","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:44:33\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:40:36\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:39:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["empty derivedKey, normal salt, SHA-512, with normal info with 0 length",1,"assert_equals: deriveBits with 0 length correctly threw OperationError: Argument 2 of SubtleCrypto.deriveBits is not an object. expected \"OperationError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:54:33\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:50:36\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:49:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-CBC length: 128 using empty derivedKey, normal salt, SHA-512, with normal info",1,"assert_unreached: deriveKey failed with error TypeError: Argument 2 of SubtleCrypto.deriveKey is not an object. Reached unreachable code","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:79:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:69:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:68:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-CBC length: 128 using empty derivedKey, normal salt, SHA-512, with normal info with bad hash name SHA512",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"NotSupportedError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-CBC length: 128 using empty derivedKey, normal salt, SHA-512, with normal info with missing deriveKey usage",1,"assert_equals: deriveKey with missing deriveKey usage correctly threw InvalidAccessError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"InvalidAccessError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:104:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:100:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:99:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-CBC length: 128 using empty derivedKey, normal salt, SHA-512, with normal info with wrong (ECDH) key",0,null,null],["Derived key of type name: AES-CBC length: 192 using empty derivedKey, normal salt, SHA-512, with normal info",1,"assert_unreached: deriveKey failed with error TypeError: Argument 2 of SubtleCrypto.deriveKey is not an object. Reached unreachable code","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:79:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:69:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:68:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-CBC length: 192 using empty derivedKey, normal salt, SHA-512, with normal info with bad hash name SHA512",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"NotSupportedError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-CBC length: 192 using empty derivedKey, normal salt, SHA-512, with normal info with missing deriveKey usage",1,"assert_equals: deriveKey with missing deriveKey usage correctly threw InvalidAccessError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"InvalidAccessError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:104:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:100:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:99:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-CBC length: 192 using empty derivedKey, normal salt, SHA-512, with normal info with wrong (ECDH) key",0,null,null],["Derived key of type name: AES-CBC length: 256 using empty derivedKey, normal salt, SHA-512, with normal info",1,"assert_unreached: deriveKey failed with error TypeError: Argument 2 of SubtleCrypto.deriveKey is not an object. Reached unreachable code","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:79:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:69:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:68:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-CBC length: 256 using empty derivedKey, normal salt, SHA-512, with normal info with bad hash name SHA512",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"NotSupportedError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-CBC length: 256 using empty derivedKey, normal salt, SHA-512, with normal info with missing deriveKey usage",1,"assert_equals: deriveKey with missing deriveKey usage correctly threw InvalidAccessError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"InvalidAccessError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:104:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:100:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:99:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-CBC length: 256 using empty derivedKey, normal salt, SHA-512, with normal info with wrong (ECDH) key",0,null,null],["Derived key of type name: AES-CTR length: 128 using empty derivedKey, normal salt, SHA-512, with normal info",1,"assert_unreached: deriveKey failed with error TypeError: Argument 2 of SubtleCrypto.deriveKey is not an object. Reached unreachable code","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:79:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:69:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:68:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-CTR length: 128 using empty derivedKey, normal salt, SHA-512, with normal info with bad hash name SHA512",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"NotSupportedError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-CTR length: 128 using empty derivedKey, normal salt, SHA-512, with normal info with missing deriveKey usage",1,"assert_equals: deriveKey with missing deriveKey usage correctly threw InvalidAccessError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"InvalidAccessError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:104:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:100:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:99:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-CTR length: 128 using empty derivedKey, normal salt, SHA-512, with normal info with wrong (ECDH) key",0,null,null],["Derived key of type name: AES-CTR length: 192 using empty derivedKey, normal salt, SHA-512, with normal info",1,"assert_unreached: deriveKey failed with error TypeError: Argument 2 of SubtleCrypto.deriveKey is not an object. Reached unreachable code","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:79:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:69:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:68:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-CTR length: 192 using empty derivedKey, normal salt, SHA-512, with normal info with bad hash name SHA512",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"NotSupportedError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-CTR length: 192 using empty derivedKey, normal salt, SHA-512, with normal info with missing deriveKey usage",1,"assert_equals: deriveKey with missing deriveKey usage correctly threw InvalidAccessError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"InvalidAccessError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:104:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:100:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:99:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-CTR length: 192 using empty derivedKey, normal salt, SHA-512, with normal info with wrong (ECDH) key",0,null,null],["Derived key of type name: AES-CTR length: 256 using empty derivedKey, normal salt, SHA-512, with normal info",1,"assert_unreached: deriveKey failed with error TypeError: Argument 2 of SubtleCrypto.deriveKey is not an object. Reached unreachable code","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:79:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:69:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:68:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-CTR length: 256 using empty derivedKey, normal salt, SHA-512, with normal info with bad hash name SHA512",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"NotSupportedError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-CTR length: 256 using empty derivedKey, normal salt, SHA-512, with normal info with missing deriveKey usage",1,"assert_equals: deriveKey with missing deriveKey usage correctly threw InvalidAccessError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"InvalidAccessError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:104:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:100:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:99:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-CTR length: 256 using empty derivedKey, normal salt, SHA-512, with normal info with wrong (ECDH) key",0,null,null],["Derived key of type name: AES-GCM length: 128 using empty derivedKey, normal salt, SHA-512, with normal info",1,"assert_unreached: deriveKey failed with error TypeError: Argument 2 of SubtleCrypto.deriveKey is not an object. Reached unreachable code","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:79:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:69:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:68:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-GCM length: 128 using empty derivedKey, normal salt, SHA-512, with normal info with bad hash name SHA512",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"NotSupportedError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-GCM length: 128 using empty derivedKey, normal salt, SHA-512, with normal info with missing deriveKey usage",1,"assert_equals: deriveKey with missing deriveKey usage correctly threw InvalidAccessError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"InvalidAccessError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:104:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:100:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:99:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-GCM length: 128 using empty derivedKey, normal salt, SHA-512, with normal info with wrong (ECDH) key",0,null,null],["Derived key of type name: AES-GCM length: 192 using empty derivedKey, normal salt, SHA-512, with normal info",1,"assert_unreached: deriveKey failed with error TypeError: Argument 2 of SubtleCrypto.deriveKey is not an object. Reached unreachable code","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:79:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:69:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:68:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-GCM length: 192 using empty derivedKey, normal salt, SHA-512, with normal info with bad hash name SHA512",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"NotSupportedError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-GCM length: 192 using empty derivedKey, normal salt, SHA-512, with normal info with missing deriveKey usage",1,"assert_equals: deriveKey with missing deriveKey usage correctly threw InvalidAccessError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"InvalidAccessError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:104:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:100:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:99:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-GCM length: 192 using empty derivedKey, normal salt, SHA-512, with normal info with wrong (ECDH) key",0,null,null],["Derived key of type name: AES-GCM length: 256 using empty derivedKey, normal salt, SHA-512, with normal info",1,"assert_unreached: deriveKey failed with error TypeError: Argument 2 of SubtleCrypto.deriveKey is not an object. Reached unreachable code","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:79:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:69:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:68:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-GCM length: 256 using empty derivedKey, normal salt, SHA-512, with normal info with bad hash name SHA512",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"NotSupportedError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-GCM length: 256 using empty derivedKey, normal salt, SHA-512, with normal info with missing deriveKey usage",1,"assert_equals: deriveKey with missing deriveKey usage correctly threw InvalidAccessError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"InvalidAccessError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:104:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:100:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:99:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-GCM length: 256 using empty derivedKey, normal salt, SHA-512, with normal info with wrong (ECDH) key",0,null,null],["Derived key of type name: AES-KW length: 128 using empty derivedKey, normal salt, SHA-512, with normal info",1,"assert_unreached: deriveKey failed with error TypeError: Argument 2 of SubtleCrypto.deriveKey is not an object. Reached unreachable code","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:79:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:69:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:68:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-KW length: 128 using empty derivedKey, normal salt, SHA-512, with normal info with bad hash name SHA512",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"NotSupportedError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-KW length: 128 using empty derivedKey, normal salt, SHA-512, with normal info with missing deriveKey usage",1,"assert_equals: deriveKey with missing deriveKey usage correctly threw InvalidAccessError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"InvalidAccessError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:104:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:100:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:99:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-KW length: 128 using empty derivedKey, normal salt, SHA-512, with normal info with wrong (ECDH) key",0,null,null],["Derived key of type name: AES-KW length: 192 using empty derivedKey, normal salt, SHA-512, with normal info",1,"assert_unreached: deriveKey failed with error TypeError: Argument 2 of SubtleCrypto.deriveKey is not an object. Reached unreachable code","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:79:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:69:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:68:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-KW length: 192 using empty derivedKey, normal salt, SHA-512, with normal info with bad hash name SHA512",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"NotSupportedError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-KW length: 192 using empty derivedKey, normal salt, SHA-512, with normal info with missing deriveKey usage",1,"assert_equals: deriveKey with missing deriveKey usage correctly threw InvalidAccessError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"InvalidAccessError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:104:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:100:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:99:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-KW length: 192 using empty derivedKey, normal salt, SHA-512, with normal info with wrong (ECDH) key",0,null,null],["Derived key of type name: AES-KW length: 256 using empty derivedKey, normal salt, SHA-512, with normal info",1,"assert_unreached: deriveKey failed with error TypeError: Argument 2 of SubtleCrypto.deriveKey is not an object. Reached unreachable code","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:79:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:69:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:68:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-KW length: 256 using empty derivedKey, normal salt, SHA-512, with normal info with bad hash name SHA512",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"NotSupportedError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-KW length: 256 using empty derivedKey, normal salt, SHA-512, with normal info with missing deriveKey usage",1,"assert_equals: deriveKey with missing deriveKey usage correctly threw InvalidAccessError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"InvalidAccessError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:104:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:100:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:99:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-KW length: 256 using empty derivedKey, normal salt, SHA-512, with normal info with wrong (ECDH) key",0,null,null],["Derived key of type name: HMAC hash: SHA-1 length: 256 using empty derivedKey, normal salt, SHA-512, with normal info",1,"assert_unreached: deriveKey failed with error TypeError: Argument 2 of SubtleCrypto.deriveKey is not an object. Reached unreachable code","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:79:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:69:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:68:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: HMAC hash: SHA-1 length: 256 using empty derivedKey, normal salt, SHA-512, with normal info with bad hash name SHA512",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"NotSupportedError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: HMAC hash: SHA-1 length: 256 using empty derivedKey, normal salt, SHA-512, with normal info with missing deriveKey usage",1,"assert_equals: deriveKey with missing deriveKey usage correctly threw InvalidAccessError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"InvalidAccessError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:104:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:100:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:99:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: HMAC hash: SHA-1 length: 256 using empty derivedKey, normal salt, SHA-512, with normal info with wrong (ECDH) key",0,null,null],["Derived key of type name: HMAC hash: SHA-256 length: 256 using empty derivedKey, normal salt, SHA-512, with normal info",1,"assert_unreached: deriveKey failed with error TypeError: Argument 2 of SubtleCrypto.deriveKey is not an object. Reached unreachable code","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:79:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:69:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:68:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: HMAC hash: SHA-256 length: 256 using empty derivedKey, normal salt, SHA-512, with normal info with bad hash name SHA512",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"NotSupportedError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: HMAC hash: SHA-256 length: 256 using empty derivedKey, normal salt, SHA-512, with normal info with missing deriveKey usage",1,"assert_equals: deriveKey with missing deriveKey usage correctly threw InvalidAccessError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"InvalidAccessError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:104:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:100:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:99:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: HMAC hash: SHA-256 length: 256 using empty derivedKey, normal salt, SHA-512, with normal info with wrong (ECDH) key",0,null,null],["Derived key of type name: HMAC hash: SHA-384 length: 256 using empty derivedKey, normal salt, SHA-512, with normal info",1,"assert_unreached: deriveKey failed with error TypeError: Argument 2 of SubtleCrypto.deriveKey is not an object. Reached unreachable code","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:79:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:69:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:68:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: HMAC hash: SHA-384 length: 256 using empty derivedKey, normal salt, SHA-512, with normal info with bad hash name SHA512",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"NotSupportedError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: HMAC hash: SHA-384 length: 256 using empty derivedKey, normal salt, SHA-512, with normal info with missing deriveKey usage",1,"assert_equals: deriveKey with missing deriveKey usage correctly threw InvalidAccessError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"InvalidAccessError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:104:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:100:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:99:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: HMAC hash: SHA-384 length: 256 using empty derivedKey, normal salt, SHA-512, with normal info with wrong (ECDH) key",0,null,null],["Derived key of type name: HMAC hash: SHA-512 length: 256 using empty derivedKey, normal salt, SHA-512, with normal info",1,"assert_unreached: deriveKey failed with error TypeError: Argument 2 of SubtleCrypto.deriveKey is not an object. Reached unreachable code","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:79:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:69:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:68:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: HMAC hash: SHA-512 length: 256 using empty derivedKey, normal salt, SHA-512, with normal info with bad hash name SHA512",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"NotSupportedError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: HMAC hash: SHA-512 length: 256 using empty derivedKey, normal salt, SHA-512, with normal info with missing deriveKey usage",1,"assert_equals: deriveKey with missing deriveKey usage correctly threw InvalidAccessError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"InvalidAccessError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:104:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:100:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:99:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: HMAC hash: SHA-512 length: 256 using empty derivedKey, normal salt, SHA-512, with normal info with wrong (ECDH) key",0,null,null],["empty derivedKey, normal salt, SHA-512, with normal info with missing salt",0,null,null],["empty derivedKey, normal salt, SHA-512, with normal info with missing info",0,null,null],["empty derivedKey, normal salt, SHA-512, with normal info with null length",0,null,null],["empty derivedKey, normal salt, SHA-512, with normal info with non-multiple of 8 length",1,"assert_equals: deriveBits with non-multiple of 8 length correctly threw OperationError: Argument 2 of SubtleCrypto.deriveBits is not an object. expected \"OperationError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:158:33\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:154:36\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:153:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["empty derivedKey, normal salt, SHA-512, with normal info with bad hash name SHA512",1,"assert_equals: deriveBits with bad hash name correctly threw NotSupportedError: Argument 2 of SubtleCrypto.deriveBits is not an object. expected \"NotSupportedError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:170:33\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:166:36\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:164:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["empty derivedKey, normal salt, SHA-512, with normal info with missing deriveBits usage",1,"assert_equals: deriveBits with missing deriveBits usage correctly threw InvalidAccessError: Argument 2 of SubtleCrypto.deriveBits is not an object. expected \"InvalidAccessError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:180:33\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:176:36\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:175:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["empty derivedKey, normal salt, SHA-512, with normal info with wrong (ECDH) key",0,null,null],["empty derivedKey, normal salt, SHA-512, with empty info",1,"assert_unreached: deriveBits failed with error TypeError: Argument 2 of SubtleCrypto.deriveBits is not an object. Reached unreachable code","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:44:33\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:40:36\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:39:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["empty derivedKey, normal salt, SHA-512, with empty info with 0 length",1,"assert_equals: deriveBits with 0 length correctly threw OperationError: Argument 2 of SubtleCrypto.deriveBits is not an object. expected \"OperationError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:54:33\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:50:36\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:49:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-CBC length: 128 using empty derivedKey, normal salt, SHA-512, with empty info",1,"assert_unreached: deriveKey failed with error TypeError: Argument 2 of SubtleCrypto.deriveKey is not an object. Reached unreachable code","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:79:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:69:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:68:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-CBC length: 128 using empty derivedKey, normal salt, SHA-512, with empty info with bad hash name SHA512",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"NotSupportedError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-CBC length: 128 using empty derivedKey, normal salt, SHA-512, with empty info with missing deriveKey usage",1,"assert_equals: deriveKey with missing deriveKey usage correctly threw InvalidAccessError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"InvalidAccessError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:104:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:100:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:99:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-CBC length: 128 using empty derivedKey, normal salt, SHA-512, with empty info with wrong (ECDH) key",0,null,null],["Derived key of type name: AES-CBC length: 192 using empty derivedKey, normal salt, SHA-512, with empty info",1,"assert_unreached: deriveKey failed with error TypeError: Argument 2 of SubtleCrypto.deriveKey is not an object. Reached unreachable code","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:79:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:69:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:68:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-CBC length: 192 using empty derivedKey, normal salt, SHA-512, with empty info with bad hash name SHA512",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"NotSupportedError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-CBC length: 192 using empty derivedKey, normal salt, SHA-512, with empty info with missing deriveKey usage",1,"assert_equals: deriveKey with missing deriveKey usage correctly threw InvalidAccessError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"InvalidAccessError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:104:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:100:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:99:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-CBC length: 192 using empty derivedKey, normal salt, SHA-512, with empty info with wrong (ECDH) key",0,null,null],["Derived key of type name: AES-CBC length: 256 using empty derivedKey, normal salt, SHA-512, with empty info",1,"assert_unreached: deriveKey failed with error TypeError: Argument 2 of SubtleCrypto.deriveKey is not an object. Reached unreachable code","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:79:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:69:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:68:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-CBC length: 256 using empty derivedKey, normal salt, SHA-512, with empty info with bad hash name SHA512",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"NotSupportedError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-CBC length: 256 using empty derivedKey, normal salt, SHA-512, with empty info with missing deriveKey usage",1,"assert_equals: deriveKey with missing deriveKey usage correctly threw InvalidAccessError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"InvalidAccessError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:104:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:100:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:99:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-CBC length: 256 using empty derivedKey, normal salt, SHA-512, with empty info with wrong (ECDH) key",0,null,null],["Derived key of type name: AES-CTR length: 128 using empty derivedKey, normal salt, SHA-512, with empty info",1,"assert_unreached: deriveKey failed with error TypeError: Argument 2 of SubtleCrypto.deriveKey is not an object. Reached unreachable code","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:79:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:69:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:68:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-CTR length: 128 using empty derivedKey, normal salt, SHA-512, with empty info with bad hash name SHA512",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"NotSupportedError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-CTR length: 128 using empty derivedKey, normal salt, SHA-512, with empty info with missing deriveKey usage",1,"assert_equals: deriveKey with missing deriveKey usage correctly threw InvalidAccessError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"InvalidAccessError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:104:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:100:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:99:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-CTR length: 128 using empty derivedKey, normal salt, SHA-512, with empty info with wrong (ECDH) key",0,null,null],["Derived key of type name: AES-CTR length: 192 using empty derivedKey, normal salt, SHA-512, with empty info",1,"assert_unreached: deriveKey failed with error TypeError: Argument 2 of SubtleCrypto.deriveKey is not an object. Reached unreachable code","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:79:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:69:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:68:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-CTR length: 192 using empty derivedKey, normal salt, SHA-512, with empty info with bad hash name SHA512",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"NotSupportedError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-CTR length: 192 using empty derivedKey, normal salt, SHA-512, with empty info with missing deriveKey usage",1,"assert_equals: deriveKey with missing deriveKey usage correctly threw InvalidAccessError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"InvalidAccessError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:104:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:100:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:99:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-CTR length: 192 using empty derivedKey, normal salt, SHA-512, with empty info with wrong (ECDH) key",0,null,null],["Derived key of type name: AES-CTR length: 256 using empty derivedKey, normal salt, SHA-512, with empty info",1,"assert_unreached: deriveKey failed with error TypeError: Argument 2 of SubtleCrypto.deriveKey is not an object. Reached unreachable code","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:79:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:69:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:68:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-CTR length: 256 using empty derivedKey, normal salt, SHA-512, with empty info with bad hash name SHA512",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"NotSupportedError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-CTR length: 256 using empty derivedKey, normal salt, SHA-512, with empty info with missing deriveKey usage",1,"assert_equals: deriveKey with missing deriveKey usage correctly threw InvalidAccessError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"InvalidAccessError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:104:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:100:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:99:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-CTR length: 256 using empty derivedKey, normal salt, SHA-512, with empty info with wrong (ECDH) key",0,null,null],["Derived key of type name: AES-GCM length: 128 using empty derivedKey, normal salt, SHA-512, with empty info",1,"assert_unreached: deriveKey failed with error TypeError: Argument 2 of SubtleCrypto.deriveKey is not an object. Reached unreachable code","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:79:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:69:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:68:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-GCM length: 128 using empty derivedKey, normal salt, SHA-512, with empty info with bad hash name SHA512",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"NotSupportedError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-GCM length: 128 using empty derivedKey, normal salt, SHA-512, with empty info with missing deriveKey usage",1,"assert_equals: deriveKey with missing deriveKey usage correctly threw InvalidAccessError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"InvalidAccessError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:104:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:100:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:99:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-GCM length: 128 using empty derivedKey, normal salt, SHA-512, with empty info with wrong (ECDH) key",0,null,null],["Derived key of type name: AES-GCM length: 192 using empty derivedKey, normal salt, SHA-512, with empty info",1,"assert_unreached: deriveKey failed with error TypeError: Argument 2 of SubtleCrypto.deriveKey is not an object. Reached unreachable code","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:79:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:69:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:68:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-GCM length: 192 using empty derivedKey, normal salt, SHA-512, with empty info with bad hash name SHA512",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"NotSupportedError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-GCM length: 192 using empty derivedKey, normal salt, SHA-512, with empty info with missing deriveKey usage",1,"assert_equals: deriveKey with missing deriveKey usage correctly threw InvalidAccessError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"InvalidAccessError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:104:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:100:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:99:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-GCM length: 192 using empty derivedKey, normal salt, SHA-512, with empty info with wrong (ECDH) key",0,null,null],["Derived key of type name: AES-GCM length: 256 using empty derivedKey, normal salt, SHA-512, with empty info",1,"assert_unreached: deriveKey failed with error TypeError: Argument 2 of SubtleCrypto.deriveKey is not an object. Reached unreachable code","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:79:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:69:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:68:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-GCM length: 256 using empty derivedKey, normal salt, SHA-512, with empty info with bad hash name SHA512",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"NotSupportedError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-GCM length: 256 using empty derivedKey, normal salt, SHA-512, with empty info with missing deriveKey usage",1,"assert_equals: deriveKey with missing deriveKey usage correctly threw InvalidAccessError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"InvalidAccessError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:104:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:100:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:99:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-GCM length: 256 using empty derivedKey, normal salt, SHA-512, with empty info with wrong (ECDH) key",0,null,null],["Derived key of type name: AES-KW length: 128 using empty derivedKey, normal salt, SHA-512, with empty info",1,"assert_unreached: deriveKey failed with error TypeError: Argument 2 of SubtleCrypto.deriveKey is not an object. Reached unreachable code","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:79:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:69:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:68:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-KW length: 128 using empty derivedKey, normal salt, SHA-512, with empty info with bad hash name SHA512",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"NotSupportedError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-KW length: 128 using empty derivedKey, normal salt, SHA-512, with empty info with missing deriveKey usage",1,"assert_equals: deriveKey with missing deriveKey usage correctly threw InvalidAccessError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"InvalidAccessError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:104:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:100:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:99:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-KW length: 128 using empty derivedKey, normal salt, SHA-512, with empty info with wrong (ECDH) key",0,null,null],["Derived key of type name: AES-KW length: 192 using empty derivedKey, normal salt, SHA-512, with empty info",1,"assert_unreached: deriveKey failed with error TypeError: Argument 2 of SubtleCrypto.deriveKey is not an object. Reached unreachable code","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:79:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:69:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:68:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-KW length: 192 using empty derivedKey, normal salt, SHA-512, with empty info with bad hash name SHA512",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"NotSupportedError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-KW length: 192 using empty derivedKey, normal salt, SHA-512, with empty info with missing deriveKey usage",1,"assert_equals: deriveKey with missing deriveKey usage correctly threw InvalidAccessError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"InvalidAccessError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:104:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:100:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:99:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-KW length: 192 using empty derivedKey, normal salt, SHA-512, with empty info with wrong (ECDH) key",0,null,null],["Derived key of type name: AES-KW length: 256 using empty derivedKey, normal salt, SHA-512, with empty info",1,"assert_unreached: deriveKey failed with error TypeError: Argument 2 of SubtleCrypto.deriveKey is not an object. Reached unreachable code","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:79:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:69:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:68:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-KW length: 256 using empty derivedKey, normal salt, SHA-512, with empty info with bad hash name SHA512",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"NotSupportedError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-KW length: 256 using empty derivedKey, normal salt, SHA-512, with empty info with missing deriveKey usage",1,"assert_equals: deriveKey with missing deriveKey usage correctly threw InvalidAccessError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"InvalidAccessError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:104:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:100:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:99:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-KW length: 256 using empty derivedKey, normal salt, SHA-512, with empty info with wrong (ECDH) key",0,null,null],["Derived key of type name: HMAC hash: SHA-1 length: 256 using empty derivedKey, normal salt, SHA-512, with empty info",1,"assert_unreached: deriveKey failed with error TypeError: Argument 2 of SubtleCrypto.deriveKey is not an object. Reached unreachable code","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:79:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:69:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:68:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: HMAC hash: SHA-1 length: 256 using empty derivedKey, normal salt, SHA-512, with empty info with bad hash name SHA512",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"NotSupportedError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: HMAC hash: SHA-1 length: 256 using empty derivedKey, normal salt, SHA-512, with empty info with missing deriveKey usage",1,"assert_equals: deriveKey with missing deriveKey usage correctly threw InvalidAccessError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"InvalidAccessError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:104:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:100:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:99:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: HMAC hash: SHA-1 length: 256 using empty derivedKey, normal salt, SHA-512, with empty info with wrong (ECDH) key",0,null,null],["Derived key of type name: HMAC hash: SHA-256 length: 256 using empty derivedKey, normal salt, SHA-512, with empty info",1,"assert_unreached: deriveKey failed with error TypeError: Argument 2 of SubtleCrypto.deriveKey is not an object. Reached unreachable code","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:79:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:69:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:68:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: HMAC hash: SHA-256 length: 256 using empty derivedKey, normal salt, SHA-512, with empty info with bad hash name SHA512",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"NotSupportedError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: HMAC hash: SHA-256 length: 256 using empty derivedKey, normal salt, SHA-512, with empty info with missing deriveKey usage",1,"assert_equals: deriveKey with missing deriveKey usage correctly threw InvalidAccessError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"InvalidAccessError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:104:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:100:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:99:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: HMAC hash: SHA-256 length: 256 using empty derivedKey, normal salt, SHA-512, with empty info with wrong (ECDH) key",0,null,null],["Derived key of type name: HMAC hash: SHA-384 length: 256 using empty derivedKey, normal salt, SHA-512, with empty info",1,"assert_unreached: deriveKey failed with error TypeError: Argument 2 of SubtleCrypto.deriveKey is not an object. Reached unreachable code","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:79:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:69:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:68:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: HMAC hash: SHA-384 length: 256 using empty derivedKey, normal salt, SHA-512, with empty info with bad hash name SHA512",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"NotSupportedError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: HMAC hash: SHA-384 length: 256 using empty derivedKey, normal salt, SHA-512, with empty info with missing deriveKey usage",1,"assert_equals: deriveKey with missing deriveKey usage correctly threw InvalidAccessError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"InvalidAccessError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:104:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:100:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:99:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: HMAC hash: SHA-384 length: 256 using empty derivedKey, normal salt, SHA-512, with empty info with wrong (ECDH) key",0,null,null],["Derived key of type name: HMAC hash: SHA-512 length: 256 using empty derivedKey, normal salt, SHA-512, with empty info",1,"assert_unreached: deriveKey failed with error TypeError: Argument 2 of SubtleCrypto.deriveKey is not an object. Reached unreachable code","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:79:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:69:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:68:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: HMAC hash: SHA-512 length: 256 using empty derivedKey, normal salt, SHA-512, with empty info with bad hash name SHA512",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"NotSupportedError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: HMAC hash: SHA-512 length: 256 using empty derivedKey, normal salt, SHA-512, with empty info with missing deriveKey usage",1,"assert_equals: deriveKey with missing deriveKey usage correctly threw InvalidAccessError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"InvalidAccessError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:104:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:100:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:99:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: HMAC hash: SHA-512 length: 256 using empty derivedKey, normal salt, SHA-512, with empty info with wrong (ECDH) key",0,null,null],["empty derivedKey, normal salt, SHA-512, with empty info with missing salt",0,null,null],["empty derivedKey, normal salt, SHA-512, with empty info with missing info",0,null,null],["empty derivedKey, normal salt, SHA-512, with empty info with null length",0,null,null],["empty derivedKey, normal salt, SHA-512, with empty info with non-multiple of 8 length",1,"assert_equals: deriveBits with non-multiple of 8 length correctly threw OperationError: Argument 2 of SubtleCrypto.deriveBits is not an object. expected \"OperationError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:158:33\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:154:36\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:153:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["empty derivedKey, normal salt, SHA-512, with empty info with bad hash name SHA512",1,"assert_equals: deriveBits with bad hash name correctly threw NotSupportedError: Argument 2 of SubtleCrypto.deriveBits is not an object. expected \"NotSupportedError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:170:33\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:166:36\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:164:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["empty derivedKey, normal salt, SHA-512, with empty info with missing deriveBits usage",1,"assert_equals: deriveBits with missing deriveBits usage correctly threw InvalidAccessError: Argument 2 of SubtleCrypto.deriveBits is not an object. expected \"InvalidAccessError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:180:33\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:176:36\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:175:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["empty derivedKey, normal salt, SHA-512, with empty info with wrong (ECDH) key",0,null,null],["empty derivedKey, normal salt, SHA-1, with normal info",1,"assert_unreached: deriveBits failed with error TypeError: Argument 2 of SubtleCrypto.deriveBits is not an object. Reached unreachable code","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:44:33\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:40:36\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:39:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["empty derivedKey, normal salt, SHA-1, with normal info with 0 length",1,"assert_equals: deriveBits with 0 length correctly threw OperationError: Argument 2 of SubtleCrypto.deriveBits is not an object. expected \"OperationError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:54:33\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:50:36\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:49:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-CBC length: 128 using empty derivedKey, normal salt, SHA-1, with normal info",1,"assert_unreached: deriveKey failed with error TypeError: Argument 2 of SubtleCrypto.deriveKey is not an object. Reached unreachable code","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:79:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:69:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:68:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-CBC length: 128 using empty derivedKey, normal salt, SHA-1, with normal info with bad hash name SHA1",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"NotSupportedError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-CBC length: 128 using empty derivedKey, normal salt, SHA-1, with normal info with missing deriveKey usage",1,"assert_equals: deriveKey with missing deriveKey usage correctly threw InvalidAccessError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"InvalidAccessError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:104:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:100:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:99:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-CBC length: 128 using empty derivedKey, normal salt, SHA-1, with normal info with wrong (ECDH) key",0,null,null],["Derived key of type name: AES-CBC length: 192 using empty derivedKey, normal salt, SHA-1, with normal info",1,"assert_unreached: deriveKey failed with error TypeError: Argument 2 of SubtleCrypto.deriveKey is not an object. Reached unreachable code","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:79:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:69:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:68:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-CBC length: 192 using empty derivedKey, normal salt, SHA-1, with normal info with bad hash name SHA1",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"NotSupportedError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-CBC length: 192 using empty derivedKey, normal salt, SHA-1, with normal info with missing deriveKey usage",1,"assert_equals: deriveKey with missing deriveKey usage correctly threw InvalidAccessError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"InvalidAccessError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:104:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:100:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:99:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-CBC length: 192 using empty derivedKey, normal salt, SHA-1, with normal info with wrong (ECDH) key",0,null,null],["Derived key of type name: AES-CBC length: 256 using empty derivedKey, normal salt, SHA-1, with normal info",1,"assert_unreached: deriveKey failed with error TypeError: Argument 2 of SubtleCrypto.deriveKey is not an object. Reached unreachable code","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:79:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:69:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:68:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-CBC length: 256 using empty derivedKey, normal salt, SHA-1, with normal info with bad hash name SHA1",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"NotSupportedError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-CBC length: 256 using empty derivedKey, normal salt, SHA-1, with normal info with missing deriveKey usage",1,"assert_equals: deriveKey with missing deriveKey usage correctly threw InvalidAccessError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"InvalidAccessError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:104:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:100:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:99:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-CBC length: 256 using empty derivedKey, normal salt, SHA-1, with normal info with wrong (ECDH) key",0,null,null],["Derived key of type name: AES-CTR length: 128 using empty derivedKey, normal salt, SHA-1, with normal info",1,"assert_unreached: deriveKey failed with error TypeError: Argument 2 of SubtleCrypto.deriveKey is not an object. Reached unreachable code","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:79:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:69:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:68:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-CTR length: 128 using empty derivedKey, normal salt, SHA-1, with normal info with bad hash name SHA1",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"NotSupportedError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-CTR length: 128 using empty derivedKey, normal salt, SHA-1, with normal info with missing deriveKey usage",1,"assert_equals: deriveKey with missing deriveKey usage correctly threw InvalidAccessError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"InvalidAccessError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:104:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:100:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:99:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-CTR length: 128 using empty derivedKey, normal salt, SHA-1, with normal info with wrong (ECDH) key",0,null,null],["Derived key of type name: AES-CTR length: 192 using empty derivedKey, normal salt, SHA-1, with normal info",1,"assert_unreached: deriveKey failed with error TypeError: Argument 2 of SubtleCrypto.deriveKey is not an object. Reached unreachable code","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:79:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:69:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:68:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-CTR length: 192 using empty derivedKey, normal salt, SHA-1, with normal info with bad hash name SHA1",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"NotSupportedError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-CTR length: 192 using empty derivedKey, normal salt, SHA-1, with normal info with missing deriveKey usage",1,"assert_equals: deriveKey with missing deriveKey usage correctly threw InvalidAccessError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"InvalidAccessError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:104:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:100:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:99:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-CTR length: 192 using empty derivedKey, normal salt, SHA-1, with normal info with wrong (ECDH) key",0,null,null],["Derived key of type name: AES-CTR length: 256 using empty derivedKey, normal salt, SHA-1, with normal info",1,"assert_unreached: deriveKey failed with error TypeError: Argument 2 of SubtleCrypto.deriveKey is not an object. Reached unreachable code","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:79:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:69:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:68:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-CTR length: 256 using empty derivedKey, normal salt, SHA-1, with normal info with bad hash name SHA1",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"NotSupportedError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-CTR length: 256 using empty derivedKey, normal salt, SHA-1, with normal info with missing deriveKey usage",1,"assert_equals: deriveKey with missing deriveKey usage correctly threw InvalidAccessError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"InvalidAccessError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:104:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:100:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:99:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-CTR length: 256 using empty derivedKey, normal salt, SHA-1, with normal info with wrong (ECDH) key",0,null,null],["Derived key of type name: AES-GCM length: 128 using empty derivedKey, normal salt, SHA-1, with normal info",1,"assert_unreached: deriveKey failed with error TypeError: Argument 2 of SubtleCrypto.deriveKey is not an object. Reached unreachable code","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:79:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:69:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:68:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-GCM length: 128 using empty derivedKey, normal salt, SHA-1, with normal info with bad hash name SHA1",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"NotSupportedError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-GCM length: 128 using empty derivedKey, normal salt, SHA-1, with normal info with missing deriveKey usage",1,"assert_equals: deriveKey with missing deriveKey usage correctly threw InvalidAccessError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"InvalidAccessError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:104:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:100:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:99:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-GCM length: 128 using empty derivedKey, normal salt, SHA-1, with normal info with wrong (ECDH) key",0,null,null],["Derived key of type name: AES-GCM length: 192 using empty derivedKey, normal salt, SHA-1, with normal info",1,"assert_unreached: deriveKey failed with error TypeError: Argument 2 of SubtleCrypto.deriveKey is not an object. Reached unreachable code","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:79:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:69:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:68:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-GCM length: 192 using empty derivedKey, normal salt, SHA-1, with normal info with bad hash name SHA1",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"NotSupportedError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-GCM length: 192 using empty derivedKey, normal salt, SHA-1, with normal info with missing deriveKey usage",1,"assert_equals: deriveKey with missing deriveKey usage correctly threw InvalidAccessError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"InvalidAccessError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:104:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:100:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:99:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-GCM length: 192 using empty derivedKey, normal salt, SHA-1, with normal info with wrong (ECDH) key",0,null,null],["Derived key of type name: AES-GCM length: 256 using empty derivedKey, normal salt, SHA-1, with normal info",1,"assert_unreached: deriveKey failed with error TypeError: Argument 2 of SubtleCrypto.deriveKey is not an object. Reached unreachable code","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:79:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:69:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:68:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-GCM length: 256 using empty derivedKey, normal salt, SHA-1, with normal info with bad hash name SHA1",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"NotSupportedError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-GCM length: 256 using empty derivedKey, normal salt, SHA-1, with normal info with missing deriveKey usage",1,"assert_equals: deriveKey with missing deriveKey usage correctly threw InvalidAccessError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"InvalidAccessError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:104:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:100:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:99:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-GCM length: 256 using empty derivedKey, normal salt, SHA-1, with normal info with wrong (ECDH) key",0,null,null],["Derived key of type name: AES-KW length: 128 using empty derivedKey, normal salt, SHA-1, with normal info",1,"assert_unreached: deriveKey failed with error TypeError: Argument 2 of SubtleCrypto.deriveKey is not an object. Reached unreachable code","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:79:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:69:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:68:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-KW length: 128 using empty derivedKey, normal salt, SHA-1, with normal info with bad hash name SHA1",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"NotSupportedError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-KW length: 128 using empty derivedKey, normal salt, SHA-1, with normal info with missing deriveKey usage",1,"assert_equals: deriveKey with missing deriveKey usage correctly threw InvalidAccessError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"InvalidAccessError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:104:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:100:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:99:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-KW length: 128 using empty derivedKey, normal salt, SHA-1, with normal info with wrong (ECDH) key",0,null,null],["Derived key of type name: AES-KW length: 192 using empty derivedKey, normal salt, SHA-1, with normal info",1,"assert_unreached: deriveKey failed with error TypeError: Argument 2 of SubtleCrypto.deriveKey is not an object. Reached unreachable code","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:79:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:69:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:68:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-KW length: 192 using empty derivedKey, normal salt, SHA-1, with normal info with bad hash name SHA1",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"NotSupportedError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-KW length: 192 using empty derivedKey, normal salt, SHA-1, with normal info with missing deriveKey usage",1,"assert_equals: deriveKey with missing deriveKey usage correctly threw InvalidAccessError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"InvalidAccessError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:104:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:100:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:99:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-KW length: 192 using empty derivedKey, normal salt, SHA-1, with normal info with wrong (ECDH) key",0,null,null],["Derived key of type name: AES-KW length: 256 using empty derivedKey, normal salt, SHA-1, with normal info",1,"assert_unreached: deriveKey failed with error TypeError: Argument 2 of SubtleCrypto.deriveKey is not an object. Reached unreachable code","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:79:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:69:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:68:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-KW length: 256 using empty derivedKey, normal salt, SHA-1, with normal info with bad hash name SHA1",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"NotSupportedError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-KW length: 256 using empty derivedKey, normal salt, SHA-1, with normal info with missing deriveKey usage",1,"assert_equals: deriveKey with missing deriveKey usage correctly threw InvalidAccessError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"InvalidAccessError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:104:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:100:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:99:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-KW length: 256 using empty derivedKey, normal salt, SHA-1, with normal info with wrong (ECDH) key",0,null,null],["Derived key of type name: HMAC hash: SHA-1 length: 256 using empty derivedKey, normal salt, SHA-1, with normal info",1,"assert_unreached: deriveKey failed with error TypeError: Argument 2 of SubtleCrypto.deriveKey is not an object. Reached unreachable code","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:79:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:69:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:68:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: HMAC hash: SHA-1 length: 256 using empty derivedKey, normal salt, SHA-1, with normal info with bad hash name SHA1",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"NotSupportedError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: HMAC hash: SHA-1 length: 256 using empty derivedKey, normal salt, SHA-1, with normal info with missing deriveKey usage",1,"assert_equals: deriveKey with missing deriveKey usage correctly threw InvalidAccessError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"InvalidAccessError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:104:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:100:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:99:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: HMAC hash: SHA-1 length: 256 using empty derivedKey, normal salt, SHA-1, with normal info with wrong (ECDH) key",0,null,null],["Derived key of type name: HMAC hash: SHA-256 length: 256 using empty derivedKey, normal salt, SHA-1, with normal info",1,"assert_unreached: deriveKey failed with error TypeError: Argument 2 of SubtleCrypto.deriveKey is not an object. Reached unreachable code","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:79:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:69:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:68:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: HMAC hash: SHA-256 length: 256 using empty derivedKey, normal salt, SHA-1, with normal info with bad hash name SHA1",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"NotSupportedError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: HMAC hash: SHA-256 length: 256 using empty derivedKey, normal salt, SHA-1, with normal info with missing deriveKey usage",1,"assert_equals: deriveKey with missing deriveKey usage correctly threw InvalidAccessError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"InvalidAccessError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:104:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:100:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:99:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: HMAC hash: SHA-256 length: 256 using empty derivedKey, normal salt, SHA-1, with normal info with wrong (ECDH) key",0,null,null],["Derived key of type name: HMAC hash: SHA-384 length: 256 using empty derivedKey, normal salt, SHA-1, with normal info",1,"assert_unreached: deriveKey failed with error TypeError: Argument 2 of SubtleCrypto.deriveKey is not an object. Reached unreachable code","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:79:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:69:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:68:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: HMAC hash: SHA-384 length: 256 using empty derivedKey, normal salt, SHA-1, with normal info with bad hash name SHA1",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"NotSupportedError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: HMAC hash: SHA-384 length: 256 using empty derivedKey, normal salt, SHA-1, with normal info with missing deriveKey usage",1,"assert_equals: deriveKey with missing deriveKey usage correctly threw InvalidAccessError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"InvalidAccessError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:104:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:100:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:99:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: HMAC hash: SHA-384 length: 256 using empty derivedKey, normal salt, SHA-1, with normal info with wrong (ECDH) key",0,null,null],["Derived key of type name: HMAC hash: SHA-512 length: 256 using empty derivedKey, normal salt, SHA-1, with normal info",1,"assert_unreached: deriveKey failed with error TypeError: Argument 2 of SubtleCrypto.deriveKey is not an object. Reached unreachable code","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:79:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:69:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:68:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: HMAC hash: SHA-512 length: 256 using empty derivedKey, normal salt, SHA-1, with normal info with bad hash name SHA1",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"NotSupportedError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: HMAC hash: SHA-512 length: 256 using empty derivedKey, normal salt, SHA-1, with normal info with missing deriveKey usage",1,"assert_equals: deriveKey with missing deriveKey usage correctly threw InvalidAccessError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"InvalidAccessError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:104:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:100:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:99:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: HMAC hash: SHA-512 length: 256 using empty derivedKey, normal salt, SHA-1, with normal info with wrong (ECDH) key",0,null,null],["empty derivedKey, normal salt, SHA-1, with normal info with missing salt",0,null,null],["empty derivedKey, normal salt, SHA-1, with normal info with missing info",0,null,null],["empty derivedKey, normal salt, SHA-1, with normal info with null length",0,null,null],["empty derivedKey, normal salt, SHA-1, with normal info with non-multiple of 8 length",1,"assert_equals: deriveBits with non-multiple of 8 length correctly threw OperationError: Argument 2 of SubtleCrypto.deriveBits is not an object. expected \"OperationError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:158:33\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:154:36\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:153:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["empty derivedKey, normal salt, SHA-1, with normal info with bad hash name SHA1",1,"assert_equals: deriveBits with bad hash name correctly threw NotSupportedError: Argument 2 of SubtleCrypto.deriveBits is not an object. expected \"NotSupportedError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:170:33\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:166:36\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:164:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["empty derivedKey, normal salt, SHA-1, with normal info with missing deriveBits usage",1,"assert_equals: deriveBits with missing deriveBits usage correctly threw InvalidAccessError: Argument 2 of SubtleCrypto.deriveBits is not an object. expected \"InvalidAccessError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:180:33\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:176:36\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:175:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["empty derivedKey, normal salt, SHA-1, with normal info with wrong (ECDH) key",0,null,null],["empty derivedKey, normal salt, SHA-1, with empty info",1,"assert_unreached: deriveBits failed with error TypeError: Argument 2 of SubtleCrypto.deriveBits is not an object. Reached unreachable code","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:44:33\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:40:36\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:39:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["empty derivedKey, normal salt, SHA-1, with empty info with 0 length",1,"assert_equals: deriveBits with 0 length correctly threw OperationError: Argument 2 of SubtleCrypto.deriveBits is not an object. expected \"OperationError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:54:33\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:50:36\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:49:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-CBC length: 128 using empty derivedKey, normal salt, SHA-1, with empty info",1,"assert_unreached: deriveKey failed with error TypeError: Argument 2 of SubtleCrypto.deriveKey is not an object. Reached unreachable code","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:79:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:69:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:68:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-CBC length: 128 using empty derivedKey, normal salt, SHA-1, with empty info with bad hash name SHA1",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"NotSupportedError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-CBC length: 128 using empty derivedKey, normal salt, SHA-1, with empty info with missing deriveKey usage",1,"assert_equals: deriveKey with missing deriveKey usage correctly threw InvalidAccessError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"InvalidAccessError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:104:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:100:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:99:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-CBC length: 128 using empty derivedKey, normal salt, SHA-1, with empty info with wrong (ECDH) key",0,null,null],["Derived key of type name: AES-CBC length: 192 using empty derivedKey, normal salt, SHA-1, with empty info",1,"assert_unreached: deriveKey failed with error TypeError: Argument 2 of SubtleCrypto.deriveKey is not an object. Reached unreachable code","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:79:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:69:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:68:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-CBC length: 192 using empty derivedKey, normal salt, SHA-1, with empty info with bad hash name SHA1",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"NotSupportedError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-CBC length: 192 using empty derivedKey, normal salt, SHA-1, with empty info with missing deriveKey usage",1,"assert_equals: deriveKey with missing deriveKey usage correctly threw InvalidAccessError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"InvalidAccessError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:104:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:100:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:99:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-CBC length: 192 using empty derivedKey, normal salt, SHA-1, with empty info with wrong (ECDH) key",0,null,null],["Derived key of type name: AES-CBC length: 256 using empty derivedKey, normal salt, SHA-1, with empty info",1,"assert_unreached: deriveKey failed with error TypeError: Argument 2 of SubtleCrypto.deriveKey is not an object. Reached unreachable code","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:79:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:69:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:68:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-CBC length: 256 using empty derivedKey, normal salt, SHA-1, with empty info with bad hash name SHA1",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"NotSupportedError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-CBC length: 256 using empty derivedKey, normal salt, SHA-1, with empty info with missing deriveKey usage",1,"assert_equals: deriveKey with missing deriveKey usage correctly threw InvalidAccessError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"InvalidAccessError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:104:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:100:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:99:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-CBC length: 256 using empty derivedKey, normal salt, SHA-1, with empty info with wrong (ECDH) key",0,null,null],["Derived key of type name: AES-CTR length: 128 using empty derivedKey, normal salt, SHA-1, with empty info",1,"assert_unreached: deriveKey failed with error TypeError: Argument 2 of SubtleCrypto.deriveKey is not an object. Reached unreachable code","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:79:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:69:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:68:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-CTR length: 128 using empty derivedKey, normal salt, SHA-1, with empty info with bad hash name SHA1",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"NotSupportedError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-CTR length: 128 using empty derivedKey, normal salt, SHA-1, with empty info with missing deriveKey usage",1,"assert_equals: deriveKey with missing deriveKey usage correctly threw InvalidAccessError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"InvalidAccessError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:104:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:100:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:99:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-CTR length: 128 using empty derivedKey, normal salt, SHA-1, with empty info with wrong (ECDH) key",0,null,null],["Derived key of type name: AES-CTR length: 192 using empty derivedKey, normal salt, SHA-1, with empty info",1,"assert_unreached: deriveKey failed with error TypeError: Argument 2 of SubtleCrypto.deriveKey is not an object. Reached unreachable code","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:79:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:69:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:68:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-CTR length: 192 using empty derivedKey, normal salt, SHA-1, with empty info with bad hash name SHA1",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"NotSupportedError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-CTR length: 192 using empty derivedKey, normal salt, SHA-1, with empty info with missing deriveKey usage",1,"assert_equals: deriveKey with missing deriveKey usage correctly threw InvalidAccessError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"InvalidAccessError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:104:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:100:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:99:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-CTR length: 192 using empty derivedKey, normal salt, SHA-1, with empty info with wrong (ECDH) key",0,null,null],["Derived key of type name: AES-CTR length: 256 using empty derivedKey, normal salt, SHA-1, with empty info",1,"assert_unreached: deriveKey failed with error TypeError: Argument 2 of SubtleCrypto.deriveKey is not an object. Reached unreachable code","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:79:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:69:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:68:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-CTR length: 256 using empty derivedKey, normal salt, SHA-1, with empty info with bad hash name SHA1",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"NotSupportedError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-CTR length: 256 using empty derivedKey, normal salt, SHA-1, with empty info with missing deriveKey usage",1,"assert_equals: deriveKey with missing deriveKey usage correctly threw InvalidAccessError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"InvalidAccessError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:104:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:100:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:99:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-CTR length: 256 using empty derivedKey, normal salt, SHA-1, with empty info with wrong (ECDH) key",0,null,null],["Derived key of type name: AES-GCM length: 128 using empty derivedKey, normal salt, SHA-1, with empty info",1,"assert_unreached: deriveKey failed with error TypeError: Argument 2 of SubtleCrypto.deriveKey is not an object. Reached unreachable code","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:79:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:69:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:68:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-GCM length: 128 using empty derivedKey, normal salt, SHA-1, with empty info with bad hash name SHA1",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"NotSupportedError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-GCM length: 128 using empty derivedKey, normal salt, SHA-1, with empty info with missing deriveKey usage",1,"assert_equals: deriveKey with missing deriveKey usage correctly threw InvalidAccessError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"InvalidAccessError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:104:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:100:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:99:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-GCM length: 128 using empty derivedKey, normal salt, SHA-1, with empty info with wrong (ECDH) key",0,null,null],["Derived key of type name: AES-GCM length: 192 using empty derivedKey, normal salt, SHA-1, with empty info",1,"assert_unreached: deriveKey failed with error TypeError: Argument 2 of SubtleCrypto.deriveKey is not an object. Reached unreachable code","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:79:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:69:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:68:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-GCM length: 192 using empty derivedKey, normal salt, SHA-1, with empty info with bad hash name SHA1",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"NotSupportedError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-GCM length: 192 using empty derivedKey, normal salt, SHA-1, with empty info with missing deriveKey usage",1,"assert_equals: deriveKey with missing deriveKey usage correctly threw InvalidAccessError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"InvalidAccessError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:104:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:100:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:99:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-GCM length: 192 using empty derivedKey, normal salt, SHA-1, with empty info with wrong (ECDH) key",0,null,null],["Derived key of type name: AES-GCM length: 256 using empty derivedKey, normal salt, SHA-1, with empty info",1,"assert_unreached: deriveKey failed with error TypeError: Argument 2 of SubtleCrypto.deriveKey is not an object. Reached unreachable code","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:79:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:69:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:68:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-GCM length: 256 using empty derivedKey, normal salt, SHA-1, with empty info with bad hash name SHA1",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"NotSupportedError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-GCM length: 256 using empty derivedKey, normal salt, SHA-1, with empty info with missing deriveKey usage",1,"assert_equals: deriveKey with missing deriveKey usage correctly threw InvalidAccessError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"InvalidAccessError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:104:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:100:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:99:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-GCM length: 256 using empty derivedKey, normal salt, SHA-1, with empty info with wrong (ECDH) key",0,null,null],["Derived key of type name: AES-KW length: 128 using empty derivedKey, normal salt, SHA-1, with empty info",1,"assert_unreached: deriveKey failed with error TypeError: Argument 2 of SubtleCrypto.deriveKey is not an object. Reached unreachable code","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:79:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:69:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:68:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-KW length: 128 using empty derivedKey, normal salt, SHA-1, with empty info with bad hash name SHA1",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"NotSupportedError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-KW length: 128 using empty derivedKey, normal salt, SHA-1, with empty info with missing deriveKey usage",1,"assert_equals: deriveKey with missing deriveKey usage correctly threw InvalidAccessError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"InvalidAccessError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:104:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:100:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:99:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-KW length: 128 using empty derivedKey, normal salt, SHA-1, with empty info with wrong (ECDH) key",0,null,null],["Derived key of type name: AES-KW length: 192 using empty derivedKey, normal salt, SHA-1, with empty info",1,"assert_unreached: deriveKey failed with error TypeError: Argument 2 of SubtleCrypto.deriveKey is not an object. Reached unreachable code","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:79:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:69:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:68:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-KW length: 192 using empty derivedKey, normal salt, SHA-1, with empty info with bad hash name SHA1",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"NotSupportedError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-KW length: 192 using empty derivedKey, normal salt, SHA-1, with empty info with missing deriveKey usage",1,"assert_equals: deriveKey with missing deriveKey usage correctly threw InvalidAccessError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"InvalidAccessError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:104:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:100:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:99:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-KW length: 192 using empty derivedKey, normal salt, SHA-1, with empty info with wrong (ECDH) key",0,null,null],["Derived key of type name: AES-KW length: 256 using empty derivedKey, normal salt, SHA-1, with empty info",1,"assert_unreached: deriveKey failed with error TypeError: Argument 2 of SubtleCrypto.deriveKey is not an object. Reached unreachable code","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:79:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:69:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:68:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-KW length: 256 using empty derivedKey, normal salt, SHA-1, with empty info with bad hash name SHA1",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"NotSupportedError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-KW length: 256 using empty derivedKey, normal salt, SHA-1, with empty info with missing deriveKey usage",1,"assert_equals: deriveKey with missing deriveKey usage correctly threw InvalidAccessError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"InvalidAccessError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:104:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:100:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:99:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-KW length: 256 using empty derivedKey, normal salt, SHA-1, with empty info with wrong (ECDH) key",0,null,null],["Derived key of type name: HMAC hash: SHA-1 length: 256 using empty derivedKey, normal salt, SHA-1, with empty info",1,"assert_unreached: deriveKey failed with error TypeError: Argument 2 of SubtleCrypto.deriveKey is not an object. Reached unreachable code","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:79:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:69:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:68:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: HMAC hash: SHA-1 length: 256 using empty derivedKey, normal salt, SHA-1, with empty info with bad hash name SHA1",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"NotSupportedError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: HMAC hash: SHA-1 length: 256 using empty derivedKey, normal salt, SHA-1, with empty info with missing deriveKey usage",1,"assert_equals: deriveKey with missing deriveKey usage correctly threw InvalidAccessError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"InvalidAccessError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:104:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:100:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:99:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: HMAC hash: SHA-1 length: 256 using empty derivedKey, normal salt, SHA-1, with empty info with wrong (ECDH) key",0,null,null],["Derived key of type name: HMAC hash: SHA-256 length: 256 using empty derivedKey, normal salt, SHA-1, with empty info",1,"assert_unreached: deriveKey failed with error TypeError: Argument 2 of SubtleCrypto.deriveKey is not an object. Reached unreachable code","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:79:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:69:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:68:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: HMAC hash: SHA-256 length: 256 using empty derivedKey, normal salt, SHA-1, with empty info with bad hash name SHA1",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"NotSupportedError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: HMAC hash: SHA-256 length: 256 using empty derivedKey, normal salt, SHA-1, with empty info with missing deriveKey usage",1,"assert_equals: deriveKey with missing deriveKey usage correctly threw InvalidAccessError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"InvalidAccessError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:104:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:100:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:99:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: HMAC hash: SHA-256 length: 256 using empty derivedKey, normal salt, SHA-1, with empty info with wrong (ECDH) key",0,null,null],["Derived key of type name: HMAC hash: SHA-384 length: 256 using empty derivedKey, normal salt, SHA-1, with empty info",1,"assert_unreached: deriveKey failed with error TypeError: Argument 2 of SubtleCrypto.deriveKey is not an object. Reached unreachable code","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:79:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:69:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:68:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: HMAC hash: SHA-384 length: 256 using empty derivedKey, normal salt, SHA-1, with empty info with bad hash name SHA1",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"NotSupportedError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: HMAC hash: SHA-384 length: 256 using empty derivedKey, normal salt, SHA-1, with empty info with missing deriveKey usage",1,"assert_equals: deriveKey with missing deriveKey usage correctly threw InvalidAccessError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"InvalidAccessError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:104:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:100:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:99:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: HMAC hash: SHA-384 length: 256 using empty derivedKey, normal salt, SHA-1, with empty info with wrong (ECDH) key",0,null,null],["Derived key of type name: HMAC hash: SHA-512 length: 256 using empty derivedKey, normal salt, SHA-1, with empty info",1,"assert_unreached: deriveKey failed with error TypeError: Argument 2 of SubtleCrypto.deriveKey is not an object. Reached unreachable code","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:79:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:69:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:68:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: HMAC hash: SHA-512 length: 256 using empty derivedKey, normal salt, SHA-1, with empty info with bad hash name SHA1",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"NotSupportedError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: HMAC hash: SHA-512 length: 256 using empty derivedKey, normal salt, SHA-1, with empty info with missing deriveKey usage",1,"assert_equals: deriveKey with missing deriveKey usage correctly threw InvalidAccessError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"InvalidAccessError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:104:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:100:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:99:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: HMAC hash: SHA-512 length: 256 using empty derivedKey, normal salt, SHA-1, with empty info with wrong (ECDH) key",0,null,null],["empty derivedKey, normal salt, SHA-1, with empty info with missing salt",0,null,null],["empty derivedKey, normal salt, SHA-1, with empty info with missing info",0,null,null],["empty derivedKey, normal salt, SHA-1, with empty info with null length",0,null,null],["empty derivedKey, normal salt, SHA-1, with empty info with non-multiple of 8 length",1,"assert_equals: deriveBits with non-multiple of 8 length correctly threw OperationError: Argument 2 of SubtleCrypto.deriveBits is not an object. expected \"OperationError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:158:33\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:154:36\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:153:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["empty derivedKey, normal salt, SHA-1, with empty info with bad hash name SHA1",1,"assert_equals: deriveBits with bad hash name correctly threw NotSupportedError: Argument 2 of SubtleCrypto.deriveBits is not an object. expected \"NotSupportedError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:170:33\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:166:36\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:164:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["empty derivedKey, normal salt, SHA-1, with empty info with missing deriveBits usage",1,"assert_equals: deriveBits with missing deriveBits usage correctly threw InvalidAccessError: Argument 2 of SubtleCrypto.deriveBits is not an object. expected \"InvalidAccessError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:180:33\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:176:36\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:175:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["empty derivedKey, normal salt, SHA-1, with empty info with wrong (ECDH) key",0,null,null],["empty derivedKey, normal salt, SHA-256, with normal info",1,"assert_unreached: deriveBits failed with error TypeError: Argument 2 of SubtleCrypto.deriveBits is not an object. Reached unreachable code","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:44:33\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:40:36\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:39:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["empty derivedKey, normal salt, SHA-256, with normal info with 0 length",1,"assert_equals: deriveBits with 0 length correctly threw OperationError: Argument 2 of SubtleCrypto.deriveBits is not an object. expected \"OperationError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:54:33\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:50:36\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:49:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-CBC length: 128 using empty derivedKey, normal salt, SHA-256, with normal info",1,"assert_unreached: deriveKey failed with error TypeError: Argument 2 of SubtleCrypto.deriveKey is not an object. Reached unreachable code","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:79:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:69:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:68:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-CBC length: 128 using empty derivedKey, normal salt, SHA-256, with normal info with bad hash name SHA256",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"NotSupportedError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-CBC length: 128 using empty derivedKey, normal salt, SHA-256, with normal info with missing deriveKey usage",1,"assert_equals: deriveKey with missing deriveKey usage correctly threw InvalidAccessError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"InvalidAccessError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:104:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:100:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:99:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-CBC length: 128 using empty derivedKey, normal salt, SHA-256, with normal info with wrong (ECDH) key",0,null,null],["Derived key of type name: AES-CBC length: 192 using empty derivedKey, normal salt, SHA-256, with normal info",1,"assert_unreached: deriveKey failed with error TypeError: Argument 2 of SubtleCrypto.deriveKey is not an object. Reached unreachable code","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:79:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:69:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:68:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-CBC length: 192 using empty derivedKey, normal salt, SHA-256, with normal info with bad hash name SHA256",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"NotSupportedError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-CBC length: 192 using empty derivedKey, normal salt, SHA-256, with normal info with missing deriveKey usage",1,"assert_equals: deriveKey with missing deriveKey usage correctly threw InvalidAccessError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"InvalidAccessError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:104:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:100:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:99:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-CBC length: 192 using empty derivedKey, normal salt, SHA-256, with normal info with wrong (ECDH) key",0,null,null],["Derived key of type name: AES-CBC length: 256 using empty derivedKey, normal salt, SHA-256, with normal info",1,"assert_unreached: deriveKey failed with error TypeError: Argument 2 of SubtleCrypto.deriveKey is not an object. Reached unreachable code","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:79:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:69:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:68:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-CBC length: 256 using empty derivedKey, normal salt, SHA-256, with normal info with bad hash name SHA256",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"NotSupportedError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-CBC length: 256 using empty derivedKey, normal salt, SHA-256, with normal info with missing deriveKey usage",1,"assert_equals: deriveKey with missing deriveKey usage correctly threw InvalidAccessError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"InvalidAccessError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:104:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:100:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:99:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-CBC length: 256 using empty derivedKey, normal salt, SHA-256, with normal info with wrong (ECDH) key",0,null,null],["Derived key of type name: AES-CTR length: 128 using empty derivedKey, normal salt, SHA-256, with normal info",1,"assert_unreached: deriveKey failed with error TypeError: Argument 2 of SubtleCrypto.deriveKey is not an object. Reached unreachable code","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:79:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:69:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:68:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-CTR length: 128 using empty derivedKey, normal salt, SHA-256, with normal info with bad hash name SHA256",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"NotSupportedError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-CTR length: 128 using empty derivedKey, normal salt, SHA-256, with normal info with missing deriveKey usage",1,"assert_equals: deriveKey with missing deriveKey usage correctly threw InvalidAccessError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"InvalidAccessError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:104:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:100:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:99:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-CTR length: 128 using empty derivedKey, normal salt, SHA-256, with normal info with wrong (ECDH) key",0,null,null],["Derived key of type name: AES-CTR length: 192 using empty derivedKey, normal salt, SHA-256, with normal info",1,"assert_unreached: deriveKey failed with error TypeError: Argument 2 of SubtleCrypto.deriveKey is not an object. Reached unreachable code","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:79:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:69:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:68:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-CTR length: 192 using empty derivedKey, normal salt, SHA-256, with normal info with bad hash name SHA256",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"NotSupportedError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-CTR length: 192 using empty derivedKey, normal salt, SHA-256, with normal info with missing deriveKey usage",1,"assert_equals: deriveKey with missing deriveKey usage correctly threw InvalidAccessError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"InvalidAccessError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:104:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:100:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:99:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-CTR length: 192 using empty derivedKey, normal salt, SHA-256, with normal info with wrong (ECDH) key",0,null,null],["Derived key of type name: AES-CTR length: 256 using empty derivedKey, normal salt, SHA-256, with normal info",1,"assert_unreached: deriveKey failed with error TypeError: Argument 2 of SubtleCrypto.deriveKey is not an object. Reached unreachable code","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:79:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:69:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:68:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-CTR length: 256 using empty derivedKey, normal salt, SHA-256, with normal info with bad hash name SHA256",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"NotSupportedError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-CTR length: 256 using empty derivedKey, normal salt, SHA-256, with normal info with missing deriveKey usage",1,"assert_equals: deriveKey with missing deriveKey usage correctly threw InvalidAccessError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"InvalidAccessError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:104:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:100:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:99:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-CTR length: 256 using empty derivedKey, normal salt, SHA-256, with normal info with wrong (ECDH) key",0,null,null],["Derived key of type name: AES-GCM length: 128 using empty derivedKey, normal salt, SHA-256, with normal info",1,"assert_unreached: deriveKey failed with error TypeError: Argument 2 of SubtleCrypto.deriveKey is not an object. Reached unreachable code","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:79:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:69:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:68:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-GCM length: 128 using empty derivedKey, normal salt, SHA-256, with normal info with bad hash name SHA256",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"NotSupportedError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-GCM length: 128 using empty derivedKey, normal salt, SHA-256, with normal info with missing deriveKey usage",1,"assert_equals: deriveKey with missing deriveKey usage correctly threw InvalidAccessError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"InvalidAccessError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:104:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:100:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:99:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-GCM length: 128 using empty derivedKey, normal salt, SHA-256, with normal info with wrong (ECDH) key",0,null,null],["Derived key of type name: AES-GCM length: 192 using empty derivedKey, normal salt, SHA-256, with normal info",1,"assert_unreached: deriveKey failed with error TypeError: Argument 2 of SubtleCrypto.deriveKey is not an object. Reached unreachable code","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:79:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:69:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:68:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-GCM length: 192 using empty derivedKey, normal salt, SHA-256, with normal info with bad hash name SHA256",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"NotSupportedError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-GCM length: 192 using empty derivedKey, normal salt, SHA-256, with normal info with missing deriveKey usage",1,"assert_equals: deriveKey with missing deriveKey usage correctly threw InvalidAccessError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"InvalidAccessError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:104:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:100:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:99:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-GCM length: 192 using empty derivedKey, normal salt, SHA-256, with normal info with wrong (ECDH) key",0,null,null],["Derived key of type name: AES-GCM length: 256 using empty derivedKey, normal salt, SHA-256, with normal info",1,"assert_unreached: deriveKey failed with error TypeError: Argument 2 of SubtleCrypto.deriveKey is not an object. Reached unreachable code","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:79:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:69:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:68:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-GCM length: 256 using empty derivedKey, normal salt, SHA-256, with normal info with bad hash name SHA256",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"NotSupportedError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-GCM length: 256 using empty derivedKey, normal salt, SHA-256, with normal info with missing deriveKey usage",1,"assert_equals: deriveKey with missing deriveKey usage correctly threw InvalidAccessError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"InvalidAccessError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:104:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:100:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:99:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-GCM length: 256 using empty derivedKey, normal salt, SHA-256, with normal info with wrong (ECDH) key",0,null,null],["Derived key of type name: AES-KW length: 128 using empty derivedKey, normal salt, SHA-256, with normal info",1,"assert_unreached: deriveKey failed with error TypeError: Argument 2 of SubtleCrypto.deriveKey is not an object. Reached unreachable code","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:79:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:69:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:68:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-KW length: 128 using empty derivedKey, normal salt, SHA-256, with normal info with bad hash name SHA256",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"NotSupportedError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-KW length: 128 using empty derivedKey, normal salt, SHA-256, with normal info with missing deriveKey usage",1,"assert_equals: deriveKey with missing deriveKey usage correctly threw InvalidAccessError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"InvalidAccessError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:104:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:100:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:99:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-KW length: 128 using empty derivedKey, normal salt, SHA-256, with normal info with wrong (ECDH) key",0,null,null],["Derived key of type name: AES-KW length: 192 using empty derivedKey, normal salt, SHA-256, with normal info",1,"assert_unreached: deriveKey failed with error TypeError: Argument 2 of SubtleCrypto.deriveKey is not an object. Reached unreachable code","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:79:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:69:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:68:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-KW length: 192 using empty derivedKey, normal salt, SHA-256, with normal info with bad hash name SHA256",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"NotSupportedError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-KW length: 192 using empty derivedKey, normal salt, SHA-256, with normal info with missing deriveKey usage",1,"assert_equals: deriveKey with missing deriveKey usage correctly threw InvalidAccessError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"InvalidAccessError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:104:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:100:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:99:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-KW length: 192 using empty derivedKey, normal salt, SHA-256, with normal info with wrong (ECDH) key",0,null,null],["Derived key of type name: AES-KW length: 256 using empty derivedKey, normal salt, SHA-256, with normal info",1,"assert_unreached: deriveKey failed with error TypeError: Argument 2 of SubtleCrypto.deriveKey is not an object. Reached unreachable code","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:79:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:69:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:68:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-KW length: 256 using empty derivedKey, normal salt, SHA-256, with normal info with bad hash name SHA256",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"NotSupportedError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-KW length: 256 using empty derivedKey, normal salt, SHA-256, with normal info with missing deriveKey usage",1,"assert_equals: deriveKey with missing deriveKey usage correctly threw InvalidAccessError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"InvalidAccessError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:104:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:100:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:99:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-KW length: 256 using empty derivedKey, normal salt, SHA-256, with normal info with wrong (ECDH) key",0,null,null],["Derived key of type name: HMAC hash: SHA-1 length: 256 using empty derivedKey, normal salt, SHA-256, with normal info",1,"assert_unreached: deriveKey failed with error TypeError: Argument 2 of SubtleCrypto.deriveKey is not an object. Reached unreachable code","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:79:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:69:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:68:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: HMAC hash: SHA-1 length: 256 using empty derivedKey, normal salt, SHA-256, with normal info with bad hash name SHA256",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"NotSupportedError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: HMAC hash: SHA-1 length: 256 using empty derivedKey, normal salt, SHA-256, with normal info with missing deriveKey usage",1,"assert_equals: deriveKey with missing deriveKey usage correctly threw InvalidAccessError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"InvalidAccessError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:104:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:100:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:99:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: HMAC hash: SHA-1 length: 256 using empty derivedKey, normal salt, SHA-256, with normal info with wrong (ECDH) key",0,null,null],["Derived key of type name: HMAC hash: SHA-256 length: 256 using empty derivedKey, normal salt, SHA-256, with normal info",1,"assert_unreached: deriveKey failed with error TypeError: Argument 2 of SubtleCrypto.deriveKey is not an object. Reached unreachable code","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:79:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:69:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:68:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: HMAC hash: SHA-256 length: 256 using empty derivedKey, normal salt, SHA-256, with normal info with bad hash name SHA256",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"NotSupportedError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: HMAC hash: SHA-256 length: 256 using empty derivedKey, normal salt, SHA-256, with normal info with missing deriveKey usage",1,"assert_equals: deriveKey with missing deriveKey usage correctly threw InvalidAccessError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"InvalidAccessError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:104:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:100:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:99:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: HMAC hash: SHA-256 length: 256 using empty derivedKey, normal salt, SHA-256, with normal info with wrong (ECDH) key",0,null,null],["Derived key of type name: HMAC hash: SHA-384 length: 256 using empty derivedKey, normal salt, SHA-256, with normal info",1,"assert_unreached: deriveKey failed with error TypeError: Argument 2 of SubtleCrypto.deriveKey is not an object. Reached unreachable code","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:79:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:69:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:68:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: HMAC hash: SHA-384 length: 256 using empty derivedKey, normal salt, SHA-256, with normal info with bad hash name SHA256",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"NotSupportedError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: HMAC hash: SHA-384 length: 256 using empty derivedKey, normal salt, SHA-256, with normal info with missing deriveKey usage",1,"assert_equals: deriveKey with missing deriveKey usage correctly threw InvalidAccessError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"InvalidAccessError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:104:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:100:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:99:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: HMAC hash: SHA-384 length: 256 using empty derivedKey, normal salt, SHA-256, with normal info with wrong (ECDH) key",0,null,null],["Derived key of type name: HMAC hash: SHA-512 length: 256 using empty derivedKey, normal salt, SHA-256, with normal info",1,"assert_unreached: deriveKey failed with error TypeError: Argument 2 of SubtleCrypto.deriveKey is not an object. Reached unreachable code","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:79:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:69:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:68:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: HMAC hash: SHA-512 length: 256 using empty derivedKey, normal salt, SHA-256, with normal info with bad hash name SHA256",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"NotSupportedError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: HMAC hash: SHA-512 length: 256 using empty derivedKey, normal salt, SHA-256, with normal info with missing deriveKey usage",1,"assert_equals: deriveKey with missing deriveKey usage correctly threw InvalidAccessError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"InvalidAccessError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:104:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:100:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:99:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: HMAC hash: SHA-512 length: 256 using empty derivedKey, normal salt, SHA-256, with normal info with wrong (ECDH) key",0,null,null],["empty derivedKey, normal salt, SHA-256, with normal info with missing salt",0,null,null],["empty derivedKey, normal salt, SHA-256, with normal info with missing info",0,null,null],["empty derivedKey, normal salt, SHA-256, with normal info with null length",0,null,null],["empty derivedKey, normal salt, SHA-256, with normal info with non-multiple of 8 length",1,"assert_equals: deriveBits with non-multiple of 8 length correctly threw OperationError: Argument 2 of SubtleCrypto.deriveBits is not an object. expected \"OperationError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:158:33\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:154:36\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:153:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["empty derivedKey, normal salt, SHA-256, with normal info with bad hash name SHA256",1,"assert_equals: deriveBits with bad hash name correctly threw NotSupportedError: Argument 2 of SubtleCrypto.deriveBits is not an object. expected \"NotSupportedError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:170:33\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:166:36\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:164:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["empty derivedKey, normal salt, SHA-256, with normal info with missing deriveBits usage",1,"assert_equals: deriveBits with missing deriveBits usage correctly threw InvalidAccessError: Argument 2 of SubtleCrypto.deriveBits is not an object. expected \"InvalidAccessError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:180:33\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:176:36\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:175:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["empty derivedKey, normal salt, SHA-256, with normal info with wrong (ECDH) key",0,null,null],["empty derivedKey, normal salt, SHA-256, with empty info",1,"assert_unreached: deriveBits failed with error TypeError: Argument 2 of SubtleCrypto.deriveBits is not an object. Reached unreachable code","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:44:33\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:40:36\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:39:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["empty derivedKey, normal salt, SHA-256, with empty info with 0 length",1,"assert_equals: deriveBits with 0 length correctly threw OperationError: Argument 2 of SubtleCrypto.deriveBits is not an object. expected \"OperationError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:54:33\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:50:36\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:49:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-CBC length: 128 using empty derivedKey, normal salt, SHA-256, with empty info",1,"assert_unreached: deriveKey failed with error TypeError: Argument 2 of SubtleCrypto.deriveKey is not an object. Reached unreachable code","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:79:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:69:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:68:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-CBC length: 128 using empty derivedKey, normal salt, SHA-256, with empty info with bad hash name SHA256",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"NotSupportedError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-CBC length: 128 using empty derivedKey, normal salt, SHA-256, with empty info with missing deriveKey usage",1,"assert_equals: deriveKey with missing deriveKey usage correctly threw InvalidAccessError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"InvalidAccessError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:104:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:100:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:99:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-CBC length: 128 using empty derivedKey, normal salt, SHA-256, with empty info with wrong (ECDH) key",0,null,null],["Derived key of type name: AES-CBC length: 192 using empty derivedKey, normal salt, SHA-256, with empty info",1,"assert_unreached: deriveKey failed with error TypeError: Argument 2 of SubtleCrypto.deriveKey is not an object. Reached unreachable code","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:79:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:69:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:68:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-CBC length: 192 using empty derivedKey, normal salt, SHA-256, with empty info with bad hash name SHA256",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"NotSupportedError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-CBC length: 192 using empty derivedKey, normal salt, SHA-256, with empty info with missing deriveKey usage",1,"assert_equals: deriveKey with missing deriveKey usage correctly threw InvalidAccessError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"InvalidAccessError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:104:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:100:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:99:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-CBC length: 192 using empty derivedKey, normal salt, SHA-256, with empty info with wrong (ECDH) key",0,null,null],["Derived key of type name: AES-CBC length: 256 using empty derivedKey, normal salt, SHA-256, with empty info",1,"assert_unreached: deriveKey failed with error TypeError: Argument 2 of SubtleCrypto.deriveKey is not an object. Reached unreachable code","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:79:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:69:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:68:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-CBC length: 256 using empty derivedKey, normal salt, SHA-256, with empty info with bad hash name SHA256",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"NotSupportedError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-CBC length: 256 using empty derivedKey, normal salt, SHA-256, with empty info with missing deriveKey usage",1,"assert_equals: deriveKey with missing deriveKey usage correctly threw InvalidAccessError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"InvalidAccessError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:104:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:100:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:99:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-CBC length: 256 using empty derivedKey, normal salt, SHA-256, with empty info with wrong (ECDH) key",0,null,null],["Derived key of type name: AES-CTR length: 128 using empty derivedKey, normal salt, SHA-256, with empty info",1,"assert_unreached: deriveKey failed with error TypeError: Argument 2 of SubtleCrypto.deriveKey is not an object. Reached unreachable code","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:79:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:69:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:68:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-CTR length: 128 using empty derivedKey, normal salt, SHA-256, with empty info with bad hash name SHA256",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"NotSupportedError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-CTR length: 128 using empty derivedKey, normal salt, SHA-256, with empty info with missing deriveKey usage",1,"assert_equals: deriveKey with missing deriveKey usage correctly threw InvalidAccessError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"InvalidAccessError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:104:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:100:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:99:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-CTR length: 128 using empty derivedKey, normal salt, SHA-256, with empty info with wrong (ECDH) key",0,null,null],["Derived key of type name: AES-CTR length: 192 using empty derivedKey, normal salt, SHA-256, with empty info",1,"assert_unreached: deriveKey failed with error TypeError: Argument 2 of SubtleCrypto.deriveKey is not an object. Reached unreachable code","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:79:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:69:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:68:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-CTR length: 192 using empty derivedKey, normal salt, SHA-256, with empty info with bad hash name SHA256",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"NotSupportedError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-CTR length: 192 using empty derivedKey, normal salt, SHA-256, with empty info with missing deriveKey usage",1,"assert_equals: deriveKey with missing deriveKey usage correctly threw InvalidAccessError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"InvalidAccessError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:104:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:100:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:99:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-CTR length: 192 using empty derivedKey, normal salt, SHA-256, with empty info with wrong (ECDH) key",0,null,null],["Derived key of type name: AES-CTR length: 256 using empty derivedKey, normal salt, SHA-256, with empty info",1,"assert_unreached: deriveKey failed with error TypeError: Argument 2 of SubtleCrypto.deriveKey is not an object. Reached unreachable code","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:79:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:69:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:68:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-CTR length: 256 using empty derivedKey, normal salt, SHA-256, with empty info with bad hash name SHA256",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"NotSupportedError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-CTR length: 256 using empty derivedKey, normal salt, SHA-256, with empty info with missing deriveKey usage",1,"assert_equals: deriveKey with missing deriveKey usage correctly threw InvalidAccessError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"InvalidAccessError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:104:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:100:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:99:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-CTR length: 256 using empty derivedKey, normal salt, SHA-256, with empty info with wrong (ECDH) key",0,null,null],["Derived key of type name: AES-GCM length: 128 using empty derivedKey, normal salt, SHA-256, with empty info",1,"assert_unreached: deriveKey failed with error TypeError: Argument 2 of SubtleCrypto.deriveKey is not an object. Reached unreachable code","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:79:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:69:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:68:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-GCM length: 128 using empty derivedKey, normal salt, SHA-256, with empty info with bad hash name SHA256",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"NotSupportedError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-GCM length: 128 using empty derivedKey, normal salt, SHA-256, with empty info with missing deriveKey usage",1,"assert_equals: deriveKey with missing deriveKey usage correctly threw InvalidAccessError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"InvalidAccessError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:104:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:100:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:99:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-GCM length: 128 using empty derivedKey, normal salt, SHA-256, with empty info with wrong (ECDH) key",0,null,null],["Derived key of type name: AES-GCM length: 192 using empty derivedKey, normal salt, SHA-256, with empty info",1,"assert_unreached: deriveKey failed with error TypeError: Argument 2 of SubtleCrypto.deriveKey is not an object. Reached unreachable code","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:79:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:69:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:68:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-GCM length: 192 using empty derivedKey, normal salt, SHA-256, with empty info with bad hash name SHA256",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"NotSupportedError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-GCM length: 192 using empty derivedKey, normal salt, SHA-256, with empty info with missing deriveKey usage",1,"assert_equals: deriveKey with missing deriveKey usage correctly threw InvalidAccessError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"InvalidAccessError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:104:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:100:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:99:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-GCM length: 192 using empty derivedKey, normal salt, SHA-256, with empty info with wrong (ECDH) key",0,null,null],["Derived key of type name: AES-GCM length: 256 using empty derivedKey, normal salt, SHA-256, with empty info",1,"assert_unreached: deriveKey failed with error TypeError: Argument 2 of SubtleCrypto.deriveKey is not an object. Reached unreachable code","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:79:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:69:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:68:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-GCM length: 256 using empty derivedKey, normal salt, SHA-256, with empty info with bad hash name SHA256",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"NotSupportedError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-GCM length: 256 using empty derivedKey, normal salt, SHA-256, with empty info with missing deriveKey usage",1,"assert_equals: deriveKey with missing deriveKey usage correctly threw InvalidAccessError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"InvalidAccessError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:104:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:100:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:99:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-GCM length: 256 using empty derivedKey, normal salt, SHA-256, with empty info with wrong (ECDH) key",0,null,null],["Derived key of type name: AES-KW length: 128 using empty derivedKey, normal salt, SHA-256, with empty info",1,"assert_unreached: deriveKey failed with error TypeError: Argument 2 of SubtleCrypto.deriveKey is not an object. Reached unreachable code","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:79:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:69:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:68:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-KW length: 128 using empty derivedKey, normal salt, SHA-256, with empty info with bad hash name SHA256",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"NotSupportedError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-KW length: 128 using empty derivedKey, normal salt, SHA-256, with empty info with missing deriveKey usage",1,"assert_equals: deriveKey with missing deriveKey usage correctly threw InvalidAccessError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"InvalidAccessError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:104:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:100:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:99:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-KW length: 128 using empty derivedKey, normal salt, SHA-256, with empty info with wrong (ECDH) key",0,null,null],["Derived key of type name: AES-KW length: 192 using empty derivedKey, normal salt, SHA-256, with empty info",1,"assert_unreached: deriveKey failed with error TypeError: Argument 2 of SubtleCrypto.deriveKey is not an object. Reached unreachable code","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:79:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:69:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:68:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-KW length: 192 using empty derivedKey, normal salt, SHA-256, with empty info with bad hash name SHA256",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"NotSupportedError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-KW length: 192 using empty derivedKey, normal salt, SHA-256, with empty info with missing deriveKey usage",1,"assert_equals: deriveKey with missing deriveKey usage correctly threw InvalidAccessError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"InvalidAccessError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:104:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:100:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:99:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-KW length: 192 using empty derivedKey, normal salt, SHA-256, with empty info with wrong (ECDH) key",0,null,null],["Derived key of type name: AES-KW length: 256 using empty derivedKey, normal salt, SHA-256, with empty info",1,"assert_unreached: deriveKey failed with error TypeError: Argument 2 of SubtleCrypto.deriveKey is not an object. Reached unreachable code","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:79:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:69:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:68:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-KW length: 256 using empty derivedKey, normal salt, SHA-256, with empty info with bad hash name SHA256",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"NotSupportedError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-KW length: 256 using empty derivedKey, normal salt, SHA-256, with empty info with missing deriveKey usage",1,"assert_equals: deriveKey with missing deriveKey usage correctly threw InvalidAccessError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"InvalidAccessError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:104:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:100:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:99:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-KW length: 256 using empty derivedKey, normal salt, SHA-256, with empty info with wrong (ECDH) key",0,null,null],["Derived key of type name: HMAC hash: SHA-1 length: 256 using empty derivedKey, normal salt, SHA-256, with empty info",1,"assert_unreached: deriveKey failed with error TypeError: Argument 2 of SubtleCrypto.deriveKey is not an object. Reached unreachable code","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:79:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:69:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:68:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: HMAC hash: SHA-1 length: 256 using empty derivedKey, normal salt, SHA-256, with empty info with bad hash name SHA256",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"NotSupportedError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: HMAC hash: SHA-1 length: 256 using empty derivedKey, normal salt, SHA-256, with empty info with missing deriveKey usage",1,"assert_equals: deriveKey with missing deriveKey usage correctly threw InvalidAccessError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"InvalidAccessError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:104:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:100:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:99:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: HMAC hash: SHA-1 length: 256 using empty derivedKey, normal salt, SHA-256, with empty info with wrong (ECDH) key",0,null,null],["Derived key of type name: HMAC hash: SHA-256 length: 256 using empty derivedKey, normal salt, SHA-256, with empty info",1,"assert_unreached: deriveKey failed with error TypeError: Argument 2 of SubtleCrypto.deriveKey is not an object. Reached unreachable code","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:79:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:69:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:68:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: HMAC hash: SHA-256 length: 256 using empty derivedKey, normal salt, SHA-256, with empty info with bad hash name SHA256",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"NotSupportedError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: HMAC hash: SHA-256 length: 256 using empty derivedKey, normal salt, SHA-256, with empty info with missing deriveKey usage",1,"assert_equals: deriveKey with missing deriveKey usage correctly threw InvalidAccessError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"InvalidAccessError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:104:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:100:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:99:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: HMAC hash: SHA-256 length: 256 using empty derivedKey, normal salt, SHA-256, with empty info with wrong (ECDH) key",0,null,null],["Derived key of type name: HMAC hash: SHA-384 length: 256 using empty derivedKey, normal salt, SHA-256, with empty info",1,"assert_unreached: deriveKey failed with error TypeError: Argument 2 of SubtleCrypto.deriveKey is not an object. Reached unreachable code","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:79:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:69:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:68:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: HMAC hash: SHA-384 length: 256 using empty derivedKey, normal salt, SHA-256, with empty info with bad hash name SHA256",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"NotSupportedError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: HMAC hash: SHA-384 length: 256 using empty derivedKey, normal salt, SHA-256, with empty info with missing deriveKey usage",1,"assert_equals: deriveKey with missing deriveKey usage correctly threw InvalidAccessError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"InvalidAccessError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:104:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:100:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:99:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: HMAC hash: SHA-384 length: 256 using empty derivedKey, normal salt, SHA-256, with empty info with wrong (ECDH) key",0,null,null],["Derived key of type name: HMAC hash: SHA-512 length: 256 using empty derivedKey, normal salt, SHA-256, with empty info",1,"assert_unreached: deriveKey failed with error TypeError: Argument 2 of SubtleCrypto.deriveKey is not an object. Reached unreachable code","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:79:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:69:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:68:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: HMAC hash: SHA-512 length: 256 using empty derivedKey, normal salt, SHA-256, with empty info with bad hash name SHA256",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"NotSupportedError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: HMAC hash: SHA-512 length: 256 using empty derivedKey, normal salt, SHA-256, with empty info with missing deriveKey usage",1,"assert_equals: deriveKey with missing deriveKey usage correctly threw InvalidAccessError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"InvalidAccessError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:104:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:100:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:99:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: HMAC hash: SHA-512 length: 256 using empty derivedKey, normal salt, SHA-256, with empty info with wrong (ECDH) key",0,null,null],["empty derivedKey, normal salt, SHA-256, with empty info with missing salt",0,null,null],["empty derivedKey, normal salt, SHA-256, with empty info with missing info",0,null,null],["empty derivedKey, normal salt, SHA-256, with empty info with null length",0,null,null],["empty derivedKey, normal salt, SHA-256, with empty info with non-multiple of 8 length",1,"assert_equals: deriveBits with non-multiple of 8 length correctly threw OperationError: Argument 2 of SubtleCrypto.deriveBits is not an object. expected \"OperationError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:158:33\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:154:36\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:153:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["empty derivedKey, normal salt, SHA-256, with empty info with bad hash name SHA256",1,"assert_equals: deriveBits with bad hash name correctly threw NotSupportedError: Argument 2 of SubtleCrypto.deriveBits is not an object. expected \"NotSupportedError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:170:33\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:166:36\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:164:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["empty derivedKey, normal salt, SHA-256, with empty info with missing deriveBits usage",1,"assert_equals: deriveBits with missing deriveBits usage correctly threw InvalidAccessError: Argument 2 of SubtleCrypto.deriveBits is not an object. expected \"InvalidAccessError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:180:33\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:176:36\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:175:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["empty derivedKey, normal salt, SHA-256, with empty info with wrong (ECDH) key",0,null,null],["empty derivedKey, normal salt, PBKDF2, with normal info with non-digest algorithm PBKDF2",1,"assert_equals: deriveBits with non-digest algorithm correctly threw NotSupportedError: Argument 2 of SubtleCrypto.deriveBits is not an object. expected \"NotSupportedError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:210:29\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:206:32\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:205:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:198:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-CBC length: 128 using empty derivedKey, normal salt, PBKDF2, with normal info",1,"assert_equals: derivekey with non-digest algorithm correctly threw NotSupportedError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"NotSupportedError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:226:33\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:222:36\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:221:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:214:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:198:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-CBC length: 192 using empty derivedKey, normal salt, PBKDF2, with normal info",1,"assert_equals: derivekey with non-digest algorithm correctly threw NotSupportedError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"NotSupportedError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:226:33\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:222:36\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:221:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:214:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:198:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-CBC length: 256 using empty derivedKey, normal salt, PBKDF2, with normal info",1,"assert_equals: derivekey with non-digest algorithm correctly threw NotSupportedError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"NotSupportedError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:226:33\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:222:36\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:221:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:214:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:198:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-CTR length: 128 using empty derivedKey, normal salt, PBKDF2, with normal info",1,"assert_equals: derivekey with non-digest algorithm correctly threw NotSupportedError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"NotSupportedError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:226:33\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:222:36\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:221:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:214:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:198:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-CTR length: 192 using empty derivedKey, normal salt, PBKDF2, with normal info",1,"assert_equals: derivekey with non-digest algorithm correctly threw NotSupportedError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"NotSupportedError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:226:33\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:222:36\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:221:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:214:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:198:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-CTR length: 256 using empty derivedKey, normal salt, PBKDF2, with normal info",1,"assert_equals: derivekey with non-digest algorithm correctly threw NotSupportedError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"NotSupportedError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:226:33\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:222:36\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:221:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:214:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:198:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-GCM length: 128 using empty derivedKey, normal salt, PBKDF2, with normal info",1,"assert_equals: derivekey with non-digest algorithm correctly threw NotSupportedError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"NotSupportedError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:226:33\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:222:36\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:221:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:214:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:198:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-GCM length: 192 using empty derivedKey, normal salt, PBKDF2, with normal info",1,"assert_equals: derivekey with non-digest algorithm correctly threw NotSupportedError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"NotSupportedError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:226:33\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:222:36\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:221:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:214:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:198:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-GCM length: 256 using empty derivedKey, normal salt, PBKDF2, with normal info",1,"assert_equals: derivekey with non-digest algorithm correctly threw NotSupportedError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"NotSupportedError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:226:33\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:222:36\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:221:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:214:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:198:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-KW length: 128 using empty derivedKey, normal salt, PBKDF2, with normal info",1,"assert_equals: derivekey with non-digest algorithm correctly threw NotSupportedError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"NotSupportedError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:226:33\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:222:36\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:221:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:214:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:198:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-KW length: 192 using empty derivedKey, normal salt, PBKDF2, with normal info",1,"assert_equals: derivekey with non-digest algorithm correctly threw NotSupportedError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"NotSupportedError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:226:33\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:222:36\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:221:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:214:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:198:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-KW length: 256 using empty derivedKey, normal salt, PBKDF2, with normal info",1,"assert_equals: derivekey with non-digest algorithm correctly threw NotSupportedError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"NotSupportedError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:226:33\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:222:36\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:221:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:214:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:198:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: HMAC hash: SHA-1 length: 256 using empty derivedKey, normal salt, PBKDF2, with normal info",1,"assert_equals: derivekey with non-digest algorithm correctly threw NotSupportedError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"NotSupportedError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:226:33\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:222:36\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:221:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:214:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:198:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: HMAC hash: SHA-256 length: 256 using empty derivedKey, normal salt, PBKDF2, with normal info",1,"assert_equals: derivekey with non-digest algorithm correctly threw NotSupportedError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"NotSupportedError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:226:33\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:222:36\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:221:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:214:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:198:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: HMAC hash: SHA-384 length: 256 using empty derivedKey, normal salt, PBKDF2, with normal info",1,"assert_equals: derivekey with non-digest algorithm correctly threw NotSupportedError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"NotSupportedError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:226:33\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:222:36\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:221:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:214:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:198:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: HMAC hash: SHA-512 length: 256 using empty derivedKey, normal salt, PBKDF2, with normal info",1,"assert_equals: derivekey with non-digest algorithm correctly threw NotSupportedError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"NotSupportedError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:226:33\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:222:36\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:221:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:214:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:198:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["empty derivedKey, normal salt, PBKDF2, with empty info with non-digest algorithm PBKDF2",1,"assert_equals: deriveBits with non-digest algorithm correctly threw NotSupportedError: Argument 2 of SubtleCrypto.deriveBits is not an object. expected \"NotSupportedError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:210:29\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:206:32\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:205:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:198:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-CBC length: 128 using empty derivedKey, normal salt, PBKDF2, with empty info",1,"assert_equals: derivekey with non-digest algorithm correctly threw NotSupportedError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"NotSupportedError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:226:33\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:222:36\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:221:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:214:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:198:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-CBC length: 192 using empty derivedKey, normal salt, PBKDF2, with empty info",1,"assert_equals: derivekey with non-digest algorithm correctly threw NotSupportedError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"NotSupportedError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:226:33\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:222:36\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:221:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:214:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:198:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-CBC length: 256 using empty derivedKey, normal salt, PBKDF2, with empty info",1,"assert_equals: derivekey with non-digest algorithm correctly threw NotSupportedError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"NotSupportedError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:226:33\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:222:36\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:221:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:214:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:198:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-CTR length: 128 using empty derivedKey, normal salt, PBKDF2, with empty info",1,"assert_equals: derivekey with non-digest algorithm correctly threw NotSupportedError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"NotSupportedError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:226:33\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:222:36\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:221:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:214:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:198:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-CTR length: 192 using empty derivedKey, normal salt, PBKDF2, with empty info",1,"assert_equals: derivekey with non-digest algorithm correctly threw NotSupportedError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"NotSupportedError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:226:33\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:222:36\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:221:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:214:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:198:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-CTR length: 256 using empty derivedKey, normal salt, PBKDF2, with empty info",1,"assert_equals: derivekey with non-digest algorithm correctly threw NotSupportedError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"NotSupportedError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:226:33\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:222:36\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:221:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:214:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:198:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-GCM length: 128 using empty derivedKey, normal salt, PBKDF2, with empty info",1,"assert_equals: derivekey with non-digest algorithm correctly threw NotSupportedError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"NotSupportedError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:226:33\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:222:36\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:221:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:214:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:198:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-GCM length: 192 using empty derivedKey, normal salt, PBKDF2, with empty info",1,"assert_equals: derivekey with non-digest algorithm correctly threw NotSupportedError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"NotSupportedError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:226:33\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:222:36\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:221:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:214:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:198:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-GCM length: 256 using empty derivedKey, normal salt, PBKDF2, with empty info",1,"assert_equals: derivekey with non-digest algorithm correctly threw NotSupportedError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"NotSupportedError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:226:33\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:222:36\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:221:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:214:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:198:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-KW length: 128 using empty derivedKey, normal salt, PBKDF2, with empty info",1,"assert_equals: derivekey with non-digest algorithm correctly threw NotSupportedError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"NotSupportedError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:226:33\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:222:36\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:221:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:214:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:198:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-KW length: 192 using empty derivedKey, normal salt, PBKDF2, with empty info",1,"assert_equals: derivekey with non-digest algorithm correctly threw NotSupportedError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"NotSupportedError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:226:33\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:222:36\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:221:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:214:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:198:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-KW length: 256 using empty derivedKey, normal salt, PBKDF2, with empty info",1,"assert_equals: derivekey with non-digest algorithm correctly threw NotSupportedError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"NotSupportedError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:226:33\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:222:36\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:221:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:214:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:198:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: HMAC hash: SHA-1 length: 256 using empty derivedKey, normal salt, PBKDF2, with empty info",1,"assert_equals: derivekey with non-digest algorithm correctly threw NotSupportedError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"NotSupportedError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:226:33\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:222:36\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:221:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:214:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:198:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: HMAC hash: SHA-256 length: 256 using empty derivedKey, normal salt, PBKDF2, with empty info",1,"assert_equals: derivekey with non-digest algorithm correctly threw NotSupportedError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"NotSupportedError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:226:33\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:222:36\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:221:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:214:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:198:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: HMAC hash: SHA-384 length: 256 using empty derivedKey, normal salt, PBKDF2, with empty info",1,"assert_equals: derivekey with non-digest algorithm correctly threw NotSupportedError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"NotSupportedError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:226:33\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:222:36\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:221:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:214:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:198:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: HMAC hash: SHA-512 length: 256 using empty derivedKey, normal salt, PBKDF2, with empty info",1,"assert_equals: derivekey with non-digest algorithm correctly threw NotSupportedError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"NotSupportedError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:226:33\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:222:36\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:221:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:214:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:198:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["empty derivedKey, empty salt, SHA-384, with normal info",1,"assert_unreached: deriveBits failed with error TypeError: Argument 2 of SubtleCrypto.deriveBits is not an object. Reached unreachable code","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:44:33\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:40:36\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:39:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["empty derivedKey, empty salt, SHA-384, with normal info with 0 length",1,"assert_equals: deriveBits with 0 length correctly threw OperationError: Argument 2 of SubtleCrypto.deriveBits is not an object. expected \"OperationError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:54:33\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:50:36\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:49:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-CBC length: 128 using empty derivedKey, empty salt, SHA-384, with normal info",1,"assert_unreached: deriveKey failed with error TypeError: Argument 2 of SubtleCrypto.deriveKey is not an object. Reached unreachable code","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:79:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:69:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:68:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-CBC length: 128 using empty derivedKey, empty salt, SHA-384, with normal info with bad hash name SHA384",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"NotSupportedError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-CBC length: 128 using empty derivedKey, empty salt, SHA-384, with normal info with missing deriveKey usage",1,"assert_equals: deriveKey with missing deriveKey usage correctly threw InvalidAccessError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"InvalidAccessError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:104:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:100:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:99:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-CBC length: 128 using empty derivedKey, empty salt, SHA-384, with normal info with wrong (ECDH) key",0,null,null],["Derived key of type name: AES-CBC length: 192 using empty derivedKey, empty salt, SHA-384, with normal info",1,"assert_unreached: deriveKey failed with error TypeError: Argument 2 of SubtleCrypto.deriveKey is not an object. Reached unreachable code","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:79:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:69:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:68:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-CBC length: 192 using empty derivedKey, empty salt, SHA-384, with normal info with bad hash name SHA384",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"NotSupportedError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-CBC length: 192 using empty derivedKey, empty salt, SHA-384, with normal info with missing deriveKey usage",1,"assert_equals: deriveKey with missing deriveKey usage correctly threw InvalidAccessError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"InvalidAccessError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:104:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:100:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:99:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-CBC length: 192 using empty derivedKey, empty salt, SHA-384, with normal info with wrong (ECDH) key",0,null,null],["Derived key of type name: AES-CBC length: 256 using empty derivedKey, empty salt, SHA-384, with normal info",1,"assert_unreached: deriveKey failed with error TypeError: Argument 2 of SubtleCrypto.deriveKey is not an object. Reached unreachable code","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:79:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:69:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:68:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-CBC length: 256 using empty derivedKey, empty salt, SHA-384, with normal info with bad hash name SHA384",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"NotSupportedError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-CBC length: 256 using empty derivedKey, empty salt, SHA-384, with normal info with missing deriveKey usage",1,"assert_equals: deriveKey with missing deriveKey usage correctly threw InvalidAccessError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"InvalidAccessError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:104:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:100:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:99:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-CBC length: 256 using empty derivedKey, empty salt, SHA-384, with normal info with wrong (ECDH) key",0,null,null],["Derived key of type name: AES-CTR length: 128 using empty derivedKey, empty salt, SHA-384, with normal info",1,"assert_unreached: deriveKey failed with error TypeError: Argument 2 of SubtleCrypto.deriveKey is not an object. Reached unreachable code","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:79:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:69:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:68:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-CTR length: 128 using empty derivedKey, empty salt, SHA-384, with normal info with bad hash name SHA384",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"NotSupportedError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-CTR length: 128 using empty derivedKey, empty salt, SHA-384, with normal info with missing deriveKey usage",1,"assert_equals: deriveKey with missing deriveKey usage correctly threw InvalidAccessError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"InvalidAccessError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:104:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:100:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:99:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-CTR length: 128 using empty derivedKey, empty salt, SHA-384, with normal info with wrong (ECDH) key",0,null,null],["Derived key of type name: AES-CTR length: 192 using empty derivedKey, empty salt, SHA-384, with normal info",1,"assert_unreached: deriveKey failed with error TypeError: Argument 2 of SubtleCrypto.deriveKey is not an object. Reached unreachable code","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:79:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:69:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:68:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-CTR length: 192 using empty derivedKey, empty salt, SHA-384, with normal info with bad hash name SHA384",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"NotSupportedError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-CTR length: 192 using empty derivedKey, empty salt, SHA-384, with normal info with missing deriveKey usage",1,"assert_equals: deriveKey with missing deriveKey usage correctly threw InvalidAccessError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"InvalidAccessError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:104:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:100:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:99:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-CTR length: 192 using empty derivedKey, empty salt, SHA-384, with normal info with wrong (ECDH) key",0,null,null],["Derived key of type name: AES-CTR length: 256 using empty derivedKey, empty salt, SHA-384, with normal info",1,"assert_unreached: deriveKey failed with error TypeError: Argument 2 of SubtleCrypto.deriveKey is not an object. Reached unreachable code","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:79:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:69:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:68:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-CTR length: 256 using empty derivedKey, empty salt, SHA-384, with normal info with bad hash name SHA384",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"NotSupportedError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-CTR length: 256 using empty derivedKey, empty salt, SHA-384, with normal info with missing deriveKey usage",1,"assert_equals: deriveKey with missing deriveKey usage correctly threw InvalidAccessError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"InvalidAccessError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:104:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:100:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:99:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-CTR length: 256 using empty derivedKey, empty salt, SHA-384, with normal info with wrong (ECDH) key",0,null,null],["Derived key of type name: AES-GCM length: 128 using empty derivedKey, empty salt, SHA-384, with normal info",1,"assert_unreached: deriveKey failed with error TypeError: Argument 2 of SubtleCrypto.deriveKey is not an object. Reached unreachable code","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:79:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:69:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:68:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-GCM length: 128 using empty derivedKey, empty salt, SHA-384, with normal info with bad hash name SHA384",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"NotSupportedError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-GCM length: 128 using empty derivedKey, empty salt, SHA-384, with normal info with missing deriveKey usage",1,"assert_equals: deriveKey with missing deriveKey usage correctly threw InvalidAccessError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"InvalidAccessError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:104:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:100:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:99:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-GCM length: 128 using empty derivedKey, empty salt, SHA-384, with normal info with wrong (ECDH) key",0,null,null],["Derived key of type name: AES-GCM length: 192 using empty derivedKey, empty salt, SHA-384, with normal info",1,"assert_unreached: deriveKey failed with error TypeError: Argument 2 of SubtleCrypto.deriveKey is not an object. Reached unreachable code","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:79:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:69:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:68:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-GCM length: 192 using empty derivedKey, empty salt, SHA-384, with normal info with bad hash name SHA384",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"NotSupportedError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-GCM length: 192 using empty derivedKey, empty salt, SHA-384, with normal info with missing deriveKey usage",1,"assert_equals: deriveKey with missing deriveKey usage correctly threw InvalidAccessError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"InvalidAccessError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:104:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:100:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:99:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-GCM length: 192 using empty derivedKey, empty salt, SHA-384, with normal info with wrong (ECDH) key",0,null,null],["Derived key of type name: AES-GCM length: 256 using empty derivedKey, empty salt, SHA-384, with normal info",1,"assert_unreached: deriveKey failed with error TypeError: Argument 2 of SubtleCrypto.deriveKey is not an object. Reached unreachable code","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:79:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:69:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:68:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-GCM length: 256 using empty derivedKey, empty salt, SHA-384, with normal info with bad hash name SHA384",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"NotSupportedError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-GCM length: 256 using empty derivedKey, empty salt, SHA-384, with normal info with missing deriveKey usage",1,"assert_equals: deriveKey with missing deriveKey usage correctly threw InvalidAccessError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"InvalidAccessError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:104:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:100:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:99:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-GCM length: 256 using empty derivedKey, empty salt, SHA-384, with normal info with wrong (ECDH) key",0,null,null],["Derived key of type name: AES-KW length: 128 using empty derivedKey, empty salt, SHA-384, with normal info",1,"assert_unreached: deriveKey failed with error TypeError: Argument 2 of SubtleCrypto.deriveKey is not an object. Reached unreachable code","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:79:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:69:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:68:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-KW length: 128 using empty derivedKey, empty salt, SHA-384, with normal info with bad hash name SHA384",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"NotSupportedError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-KW length: 128 using empty derivedKey, empty salt, SHA-384, with normal info with missing deriveKey usage",1,"assert_equals: deriveKey with missing deriveKey usage correctly threw InvalidAccessError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"InvalidAccessError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:104:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:100:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:99:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-KW length: 128 using empty derivedKey, empty salt, SHA-384, with normal info with wrong (ECDH) key",0,null,null],["Derived key of type name: AES-KW length: 192 using empty derivedKey, empty salt, SHA-384, with normal info",1,"assert_unreached: deriveKey failed with error TypeError: Argument 2 of SubtleCrypto.deriveKey is not an object. Reached unreachable code","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:79:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:69:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:68:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-KW length: 192 using empty derivedKey, empty salt, SHA-384, with normal info with bad hash name SHA384",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"NotSupportedError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-KW length: 192 using empty derivedKey, empty salt, SHA-384, with normal info with missing deriveKey usage",1,"assert_equals: deriveKey with missing deriveKey usage correctly threw InvalidAccessError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"InvalidAccessError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:104:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:100:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:99:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-KW length: 192 using empty derivedKey, empty salt, SHA-384, with normal info with wrong (ECDH) key",0,null,null],["Derived key of type name: AES-KW length: 256 using empty derivedKey, empty salt, SHA-384, with normal info",1,"assert_unreached: deriveKey failed with error TypeError: Argument 2 of SubtleCrypto.deriveKey is not an object. Reached unreachable code","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:79:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:69:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:68:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-KW length: 256 using empty derivedKey, empty salt, SHA-384, with normal info with bad hash name SHA384",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"NotSupportedError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-KW length: 256 using empty derivedKey, empty salt, SHA-384, with normal info with missing deriveKey usage",1,"assert_equals: deriveKey with missing deriveKey usage correctly threw InvalidAccessError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"InvalidAccessError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:104:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:100:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:99:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-KW length: 256 using empty derivedKey, empty salt, SHA-384, with normal info with wrong (ECDH) key",0,null,null],["Derived key of type name: HMAC hash: SHA-1 length: 256 using empty derivedKey, empty salt, SHA-384, with normal info",1,"assert_unreached: deriveKey failed with error TypeError: Argument 2 of SubtleCrypto.deriveKey is not an object. Reached unreachable code","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:79:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:69:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:68:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: HMAC hash: SHA-1 length: 256 using empty derivedKey, empty salt, SHA-384, with normal info with bad hash name SHA384",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"NotSupportedError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: HMAC hash: SHA-1 length: 256 using empty derivedKey, empty salt, SHA-384, with normal info with missing deriveKey usage",1,"assert_equals: deriveKey with missing deriveKey usage correctly threw InvalidAccessError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"InvalidAccessError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:104:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:100:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:99:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: HMAC hash: SHA-1 length: 256 using empty derivedKey, empty salt, SHA-384, with normal info with wrong (ECDH) key",0,null,null],["Derived key of type name: HMAC hash: SHA-256 length: 256 using empty derivedKey, empty salt, SHA-384, with normal info",1,"assert_unreached: deriveKey failed with error TypeError: Argument 2 of SubtleCrypto.deriveKey is not an object. Reached unreachable code","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:79:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:69:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:68:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: HMAC hash: SHA-256 length: 256 using empty derivedKey, empty salt, SHA-384, with normal info with bad hash name SHA384",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"NotSupportedError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: HMAC hash: SHA-256 length: 256 using empty derivedKey, empty salt, SHA-384, with normal info with missing deriveKey usage",1,"assert_equals: deriveKey with missing deriveKey usage correctly threw InvalidAccessError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"InvalidAccessError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:104:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:100:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:99:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: HMAC hash: SHA-256 length: 256 using empty derivedKey, empty salt, SHA-384, with normal info with wrong (ECDH) key",0,null,null],["Derived key of type name: HMAC hash: SHA-384 length: 256 using empty derivedKey, empty salt, SHA-384, with normal info",1,"assert_unreached: deriveKey failed with error TypeError: Argument 2 of SubtleCrypto.deriveKey is not an object. Reached unreachable code","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:79:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:69:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:68:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: HMAC hash: SHA-384 length: 256 using empty derivedKey, empty salt, SHA-384, with normal info with bad hash name SHA384",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"NotSupportedError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: HMAC hash: SHA-384 length: 256 using empty derivedKey, empty salt, SHA-384, with normal info with missing deriveKey usage",1,"assert_equals: deriveKey with missing deriveKey usage correctly threw InvalidAccessError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"InvalidAccessError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:104:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:100:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:99:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: HMAC hash: SHA-384 length: 256 using empty derivedKey, empty salt, SHA-384, with normal info with wrong (ECDH) key",0,null,null],["Derived key of type name: HMAC hash: SHA-512 length: 256 using empty derivedKey, empty salt, SHA-384, with normal info",1,"assert_unreached: deriveKey failed with error TypeError: Argument 2 of SubtleCrypto.deriveKey is not an object. Reached unreachable code","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:79:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:69:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:68:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: HMAC hash: SHA-512 length: 256 using empty derivedKey, empty salt, SHA-384, with normal info with bad hash name SHA384",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"NotSupportedError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: HMAC hash: SHA-512 length: 256 using empty derivedKey, empty salt, SHA-384, with normal info with missing deriveKey usage",1,"assert_equals: deriveKey with missing deriveKey usage correctly threw InvalidAccessError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"InvalidAccessError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:104:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:100:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:99:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: HMAC hash: SHA-512 length: 256 using empty derivedKey, empty salt, SHA-384, with normal info with wrong (ECDH) key",0,null,null],["empty derivedKey, empty salt, SHA-384, with normal info with missing salt",0,null,null],["empty derivedKey, empty salt, SHA-384, with normal info with missing info",0,null,null],["empty derivedKey, empty salt, SHA-384, with normal info with null length",0,null,null],["empty derivedKey, empty salt, SHA-384, with normal info with non-multiple of 8 length",1,"assert_equals: deriveBits with non-multiple of 8 length correctly threw OperationError: Argument 2 of SubtleCrypto.deriveBits is not an object. expected \"OperationError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:158:33\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:154:36\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:153:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["empty derivedKey, empty salt, SHA-384, with normal info with bad hash name SHA384",1,"assert_equals: deriveBits with bad hash name correctly threw NotSupportedError: Argument 2 of SubtleCrypto.deriveBits is not an object. expected \"NotSupportedError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:170:33\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:166:36\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:164:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["empty derivedKey, empty salt, SHA-384, with normal info with missing deriveBits usage",1,"assert_equals: deriveBits with missing deriveBits usage correctly threw InvalidAccessError: Argument 2 of SubtleCrypto.deriveBits is not an object. expected \"InvalidAccessError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:180:33\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:176:36\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:175:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["empty derivedKey, empty salt, SHA-384, with normal info with wrong (ECDH) key",0,null,null],["empty derivedKey, empty salt, SHA-384, with empty info",1,"assert_unreached: deriveBits failed with error TypeError: Argument 2 of SubtleCrypto.deriveBits is not an object. Reached unreachable code","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:44:33\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:40:36\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:39:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["empty derivedKey, empty salt, SHA-384, with empty info with 0 length",1,"assert_equals: deriveBits with 0 length correctly threw OperationError: Argument 2 of SubtleCrypto.deriveBits is not an object. expected \"OperationError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:54:33\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:50:36\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:49:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-CBC length: 128 using empty derivedKey, empty salt, SHA-384, with empty info",1,"assert_unreached: deriveKey failed with error TypeError: Argument 2 of SubtleCrypto.deriveKey is not an object. Reached unreachable code","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:79:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:69:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:68:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-CBC length: 128 using empty derivedKey, empty salt, SHA-384, with empty info with bad hash name SHA384",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"NotSupportedError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-CBC length: 128 using empty derivedKey, empty salt, SHA-384, with empty info with missing deriveKey usage",1,"assert_equals: deriveKey with missing deriveKey usage correctly threw InvalidAccessError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"InvalidAccessError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:104:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:100:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:99:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-CBC length: 128 using empty derivedKey, empty salt, SHA-384, with empty info with wrong (ECDH) key",0,null,null],["Derived key of type name: AES-CBC length: 192 using empty derivedKey, empty salt, SHA-384, with empty info",1,"assert_unreached: deriveKey failed with error TypeError: Argument 2 of SubtleCrypto.deriveKey is not an object. Reached unreachable code","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:79:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:69:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:68:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-CBC length: 192 using empty derivedKey, empty salt, SHA-384, with empty info with bad hash name SHA384",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"NotSupportedError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-CBC length: 192 using empty derivedKey, empty salt, SHA-384, with empty info with missing deriveKey usage",1,"assert_equals: deriveKey with missing deriveKey usage correctly threw InvalidAccessError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"InvalidAccessError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:104:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:100:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:99:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-CBC length: 192 using empty derivedKey, empty salt, SHA-384, with empty info with wrong (ECDH) key",0,null,null],["Derived key of type name: AES-CBC length: 256 using empty derivedKey, empty salt, SHA-384, with empty info",1,"assert_unreached: deriveKey failed with error TypeError: Argument 2 of SubtleCrypto.deriveKey is not an object. Reached unreachable code","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:79:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:69:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:68:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-CBC length: 256 using empty derivedKey, empty salt, SHA-384, with empty info with bad hash name SHA384",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"NotSupportedError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-CBC length: 256 using empty derivedKey, empty salt, SHA-384, with empty info with missing deriveKey usage",1,"assert_equals: deriveKey with missing deriveKey usage correctly threw InvalidAccessError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"InvalidAccessError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:104:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:100:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:99:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-CBC length: 256 using empty derivedKey, empty salt, SHA-384, with empty info with wrong (ECDH) key",0,null,null],["Derived key of type name: AES-CTR length: 128 using empty derivedKey, empty salt, SHA-384, with empty info",1,"assert_unreached: deriveKey failed with error TypeError: Argument 2 of SubtleCrypto.deriveKey is not an object. Reached unreachable code","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:79:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:69:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:68:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-CTR length: 128 using empty derivedKey, empty salt, SHA-384, with empty info with bad hash name SHA384",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"NotSupportedError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-CTR length: 128 using empty derivedKey, empty salt, SHA-384, with empty info with missing deriveKey usage",1,"assert_equals: deriveKey with missing deriveKey usage correctly threw InvalidAccessError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"InvalidAccessError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:104:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:100:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:99:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-CTR length: 128 using empty derivedKey, empty salt, SHA-384, with empty info with wrong (ECDH) key",0,null,null],["Derived key of type name: AES-CTR length: 192 using empty derivedKey, empty salt, SHA-384, with empty info",1,"assert_unreached: deriveKey failed with error TypeError: Argument 2 of SubtleCrypto.deriveKey is not an object. Reached unreachable code","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:79:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:69:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:68:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-CTR length: 192 using empty derivedKey, empty salt, SHA-384, with empty info with bad hash name SHA384",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"NotSupportedError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-CTR length: 192 using empty derivedKey, empty salt, SHA-384, with empty info with missing deriveKey usage",1,"assert_equals: deriveKey with missing deriveKey usage correctly threw InvalidAccessError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"InvalidAccessError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:104:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:100:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:99:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-CTR length: 192 using empty derivedKey, empty salt, SHA-384, with empty info with wrong (ECDH) key",0,null,null],["Derived key of type name: AES-CTR length: 256 using empty derivedKey, empty salt, SHA-384, with empty info",1,"assert_unreached: deriveKey failed with error TypeError: Argument 2 of SubtleCrypto.deriveKey is not an object. Reached unreachable code","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:79:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:69:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:68:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-CTR length: 256 using empty derivedKey, empty salt, SHA-384, with empty info with bad hash name SHA384",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"NotSupportedError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-CTR length: 256 using empty derivedKey, empty salt, SHA-384, with empty info with missing deriveKey usage",1,"assert_equals: deriveKey with missing deriveKey usage correctly threw InvalidAccessError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"InvalidAccessError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:104:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:100:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:99:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-CTR length: 256 using empty derivedKey, empty salt, SHA-384, with empty info with wrong (ECDH) key",0,null,null],["Derived key of type name: AES-GCM length: 128 using empty derivedKey, empty salt, SHA-384, with empty info",1,"assert_unreached: deriveKey failed with error TypeError: Argument 2 of SubtleCrypto.deriveKey is not an object. Reached unreachable code","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:79:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:69:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:68:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-GCM length: 128 using empty derivedKey, empty salt, SHA-384, with empty info with bad hash name SHA384",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"NotSupportedError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-GCM length: 128 using empty derivedKey, empty salt, SHA-384, with empty info with missing deriveKey usage",1,"assert_equals: deriveKey with missing deriveKey usage correctly threw InvalidAccessError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"InvalidAccessError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:104:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:100:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:99:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-GCM length: 128 using empty derivedKey, empty salt, SHA-384, with empty info with wrong (ECDH) key",0,null,null],["Derived key of type name: AES-GCM length: 192 using empty derivedKey, empty salt, SHA-384, with empty info",1,"assert_unreached: deriveKey failed with error TypeError: Argument 2 of SubtleCrypto.deriveKey is not an object. Reached unreachable code","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:79:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:69:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:68:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-GCM length: 192 using empty derivedKey, empty salt, SHA-384, with empty info with bad hash name SHA384",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"NotSupportedError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-GCM length: 192 using empty derivedKey, empty salt, SHA-384, with empty info with missing deriveKey usage",1,"assert_equals: deriveKey with missing deriveKey usage correctly threw InvalidAccessError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"InvalidAccessError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:104:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:100:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:99:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-GCM length: 192 using empty derivedKey, empty salt, SHA-384, with empty info with wrong (ECDH) key",0,null,null],["Derived key of type name: AES-GCM length: 256 using empty derivedKey, empty salt, SHA-384, with empty info",1,"assert_unreached: deriveKey failed with error TypeError: Argument 2 of SubtleCrypto.deriveKey is not an object. Reached unreachable code","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:79:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:69:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:68:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-GCM length: 256 using empty derivedKey, empty salt, SHA-384, with empty info with bad hash name SHA384",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"NotSupportedError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-GCM length: 256 using empty derivedKey, empty salt, SHA-384, with empty info with missing deriveKey usage",1,"assert_equals: deriveKey with missing deriveKey usage correctly threw InvalidAccessError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"InvalidAccessError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:104:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:100:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:99:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-GCM length: 256 using empty derivedKey, empty salt, SHA-384, with empty info with wrong (ECDH) key",0,null,null],["Derived key of type name: AES-KW length: 128 using empty derivedKey, empty salt, SHA-384, with empty info",1,"assert_unreached: deriveKey failed with error TypeError: Argument 2 of SubtleCrypto.deriveKey is not an object. Reached unreachable code","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:79:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:69:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:68:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-KW length: 128 using empty derivedKey, empty salt, SHA-384, with empty info with bad hash name SHA384",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"NotSupportedError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-KW length: 128 using empty derivedKey, empty salt, SHA-384, with empty info with missing deriveKey usage",1,"assert_equals: deriveKey with missing deriveKey usage correctly threw InvalidAccessError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"InvalidAccessError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:104:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:100:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:99:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-KW length: 128 using empty derivedKey, empty salt, SHA-384, with empty info with wrong (ECDH) key",0,null,null],["Derived key of type name: AES-KW length: 192 using empty derivedKey, empty salt, SHA-384, with empty info",1,"assert_unreached: deriveKey failed with error TypeError: Argument 2 of SubtleCrypto.deriveKey is not an object. Reached unreachable code","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:79:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:69:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:68:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-KW length: 192 using empty derivedKey, empty salt, SHA-384, with empty info with bad hash name SHA384",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"NotSupportedError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-KW length: 192 using empty derivedKey, empty salt, SHA-384, with empty info with missing deriveKey usage",1,"assert_equals: deriveKey with missing deriveKey usage correctly threw InvalidAccessError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"InvalidAccessError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:104:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:100:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:99:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-KW length: 192 using empty derivedKey, empty salt, SHA-384, with empty info with wrong (ECDH) key",0,null,null],["Derived key of type name: AES-KW length: 256 using empty derivedKey, empty salt, SHA-384, with empty info",1,"assert_unreached: deriveKey failed with error TypeError: Argument 2 of SubtleCrypto.deriveKey is not an object. Reached unreachable code","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:79:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:69:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:68:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-KW length: 256 using empty derivedKey, empty salt, SHA-384, with empty info with bad hash name SHA384",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"NotSupportedError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-KW length: 256 using empty derivedKey, empty salt, SHA-384, with empty info with missing deriveKey usage",1,"assert_equals: deriveKey with missing deriveKey usage correctly threw InvalidAccessError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"InvalidAccessError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:104:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:100:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:99:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-KW length: 256 using empty derivedKey, empty salt, SHA-384, with empty info with wrong (ECDH) key",0,null,null],["Derived key of type name: HMAC hash: SHA-1 length: 256 using empty derivedKey, empty salt, SHA-384, with empty info",1,"assert_unreached: deriveKey failed with error TypeError: Argument 2 of SubtleCrypto.deriveKey is not an object. Reached unreachable code","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:79:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:69:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:68:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: HMAC hash: SHA-1 length: 256 using empty derivedKey, empty salt, SHA-384, with empty info with bad hash name SHA384",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"NotSupportedError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: HMAC hash: SHA-1 length: 256 using empty derivedKey, empty salt, SHA-384, with empty info with missing deriveKey usage",1,"assert_equals: deriveKey with missing deriveKey usage correctly threw InvalidAccessError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"InvalidAccessError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:104:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:100:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:99:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: HMAC hash: SHA-1 length: 256 using empty derivedKey, empty salt, SHA-384, with empty info with wrong (ECDH) key",0,null,null],["Derived key of type name: HMAC hash: SHA-256 length: 256 using empty derivedKey, empty salt, SHA-384, with empty info",1,"assert_unreached: deriveKey failed with error TypeError: Argument 2 of SubtleCrypto.deriveKey is not an object. Reached unreachable code","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:79:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:69:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:68:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: HMAC hash: SHA-256 length: 256 using empty derivedKey, empty salt, SHA-384, with empty info with bad hash name SHA384",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"NotSupportedError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: HMAC hash: SHA-256 length: 256 using empty derivedKey, empty salt, SHA-384, with empty info with missing deriveKey usage",1,"assert_equals: deriveKey with missing deriveKey usage correctly threw InvalidAccessError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"InvalidAccessError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:104:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:100:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:99:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: HMAC hash: SHA-256 length: 256 using empty derivedKey, empty salt, SHA-384, with empty info with wrong (ECDH) key",0,null,null],["Derived key of type name: HMAC hash: SHA-384 length: 256 using empty derivedKey, empty salt, SHA-384, with empty info",1,"assert_unreached: deriveKey failed with error TypeError: Argument 2 of SubtleCrypto.deriveKey is not an object. Reached unreachable code","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:79:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:69:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:68:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: HMAC hash: SHA-384 length: 256 using empty derivedKey, empty salt, SHA-384, with empty info with bad hash name SHA384",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"NotSupportedError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: HMAC hash: SHA-384 length: 256 using empty derivedKey, empty salt, SHA-384, with empty info with missing deriveKey usage",1,"assert_equals: deriveKey with missing deriveKey usage correctly threw InvalidAccessError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"InvalidAccessError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:104:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:100:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:99:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: HMAC hash: SHA-384 length: 256 using empty derivedKey, empty salt, SHA-384, with empty info with wrong (ECDH) key",0,null,null],["Derived key of type name: HMAC hash: SHA-512 length: 256 using empty derivedKey, empty salt, SHA-384, with empty info",1,"assert_unreached: deriveKey failed with error TypeError: Argument 2 of SubtleCrypto.deriveKey is not an object. Reached unreachable code","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:79:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:69:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:68:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: HMAC hash: SHA-512 length: 256 using empty derivedKey, empty salt, SHA-384, with empty info with bad hash name SHA384",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"NotSupportedError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: HMAC hash: SHA-512 length: 256 using empty derivedKey, empty salt, SHA-384, with empty info with missing deriveKey usage",1,"assert_equals: deriveKey with missing deriveKey usage correctly threw InvalidAccessError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"InvalidAccessError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:104:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:100:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:99:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: HMAC hash: SHA-512 length: 256 using empty derivedKey, empty salt, SHA-384, with empty info with wrong (ECDH) key",0,null,null],["empty derivedKey, empty salt, SHA-384, with empty info with missing salt",0,null,null],["empty derivedKey, empty salt, SHA-384, with empty info with missing info",0,null,null],["empty derivedKey, empty salt, SHA-384, with empty info with null length",0,null,null],["empty derivedKey, empty salt, SHA-384, with empty info with non-multiple of 8 length",1,"assert_equals: deriveBits with non-multiple of 8 length correctly threw OperationError: Argument 2 of SubtleCrypto.deriveBits is not an object. expected \"OperationError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:158:33\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:154:36\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:153:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["empty derivedKey, empty salt, SHA-384, with empty info with bad hash name SHA384",1,"assert_equals: deriveBits with bad hash name correctly threw NotSupportedError: Argument 2 of SubtleCrypto.deriveBits is not an object. expected \"NotSupportedError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:170:33\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:166:36\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:164:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["empty derivedKey, empty salt, SHA-384, with empty info with missing deriveBits usage",1,"assert_equals: deriveBits with missing deriveBits usage correctly threw InvalidAccessError: Argument 2 of SubtleCrypto.deriveBits is not an object. expected \"InvalidAccessError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:180:33\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:176:36\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:175:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["empty derivedKey, empty salt, SHA-384, with empty info with wrong (ECDH) key",0,null,null],["empty derivedKey, empty salt, SHA-512, with normal info",1,"assert_unreached: deriveBits failed with error TypeError: Argument 2 of SubtleCrypto.deriveBits is not an object. Reached unreachable code","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:44:33\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:40:36\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:39:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["empty derivedKey, empty salt, SHA-512, with normal info with 0 length",1,"assert_equals: deriveBits with 0 length correctly threw OperationError: Argument 2 of SubtleCrypto.deriveBits is not an object. expected \"OperationError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:54:33\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:50:36\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:49:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-CBC length: 128 using empty derivedKey, empty salt, SHA-512, with normal info",1,"assert_unreached: deriveKey failed with error TypeError: Argument 2 of SubtleCrypto.deriveKey is not an object. Reached unreachable code","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:79:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:69:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:68:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-CBC length: 128 using empty derivedKey, empty salt, SHA-512, with normal info with bad hash name SHA512",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"NotSupportedError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-CBC length: 128 using empty derivedKey, empty salt, SHA-512, with normal info with missing deriveKey usage",1,"assert_equals: deriveKey with missing deriveKey usage correctly threw InvalidAccessError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"InvalidAccessError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:104:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:100:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:99:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-CBC length: 128 using empty derivedKey, empty salt, SHA-512, with normal info with wrong (ECDH) key",0,null,null],["Derived key of type name: AES-CBC length: 192 using empty derivedKey, empty salt, SHA-512, with normal info",1,"assert_unreached: deriveKey failed with error TypeError: Argument 2 of SubtleCrypto.deriveKey is not an object. Reached unreachable code","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:79:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:69:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:68:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-CBC length: 192 using empty derivedKey, empty salt, SHA-512, with normal info with bad hash name SHA512",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"NotSupportedError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-CBC length: 192 using empty derivedKey, empty salt, SHA-512, with normal info with missing deriveKey usage",1,"assert_equals: deriveKey with missing deriveKey usage correctly threw InvalidAccessError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"InvalidAccessError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:104:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:100:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:99:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-CBC length: 192 using empty derivedKey, empty salt, SHA-512, with normal info with wrong (ECDH) key",0,null,null],["Derived key of type name: AES-CBC length: 256 using empty derivedKey, empty salt, SHA-512, with normal info",1,"assert_unreached: deriveKey failed with error TypeError: Argument 2 of SubtleCrypto.deriveKey is not an object. Reached unreachable code","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:79:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:69:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:68:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-CBC length: 256 using empty derivedKey, empty salt, SHA-512, with normal info with bad hash name SHA512",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"NotSupportedError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-CBC length: 256 using empty derivedKey, empty salt, SHA-512, with normal info with missing deriveKey usage",1,"assert_equals: deriveKey with missing deriveKey usage correctly threw InvalidAccessError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"InvalidAccessError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:104:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:100:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:99:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-CBC length: 256 using empty derivedKey, empty salt, SHA-512, with normal info with wrong (ECDH) key",0,null,null],["Derived key of type name: AES-CTR length: 128 using empty derivedKey, empty salt, SHA-512, with normal info",1,"assert_unreached: deriveKey failed with error TypeError: Argument 2 of SubtleCrypto.deriveKey is not an object. Reached unreachable code","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:79:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:69:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:68:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-CTR length: 128 using empty derivedKey, empty salt, SHA-512, with normal info with bad hash name SHA512",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"NotSupportedError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-CTR length: 128 using empty derivedKey, empty salt, SHA-512, with normal info with missing deriveKey usage",1,"assert_equals: deriveKey with missing deriveKey usage correctly threw InvalidAccessError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"InvalidAccessError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:104:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:100:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:99:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-CTR length: 128 using empty derivedKey, empty salt, SHA-512, with normal info with wrong (ECDH) key",0,null,null],["Derived key of type name: AES-CTR length: 192 using empty derivedKey, empty salt, SHA-512, with normal info",1,"assert_unreached: deriveKey failed with error TypeError: Argument 2 of SubtleCrypto.deriveKey is not an object. Reached unreachable code","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:79:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:69:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:68:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-CTR length: 192 using empty derivedKey, empty salt, SHA-512, with normal info with bad hash name SHA512",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"NotSupportedError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-CTR length: 192 using empty derivedKey, empty salt, SHA-512, with normal info with missing deriveKey usage",1,"assert_equals: deriveKey with missing deriveKey usage correctly threw InvalidAccessError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"InvalidAccessError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:104:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:100:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:99:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-CTR length: 192 using empty derivedKey, empty salt, SHA-512, with normal info with wrong (ECDH) key",0,null,null],["Derived key of type name: AES-CTR length: 256 using empty derivedKey, empty salt, SHA-512, with normal info",1,"assert_unreached: deriveKey failed with error TypeError: Argument 2 of SubtleCrypto.deriveKey is not an object. Reached unreachable code","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:79:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:69:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:68:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-CTR length: 256 using empty derivedKey, empty salt, SHA-512, with normal info with bad hash name SHA512",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"NotSupportedError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-CTR length: 256 using empty derivedKey, empty salt, SHA-512, with normal info with missing deriveKey usage",1,"assert_equals: deriveKey with missing deriveKey usage correctly threw InvalidAccessError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"InvalidAccessError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:104:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:100:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:99:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-CTR length: 256 using empty derivedKey, empty salt, SHA-512, with normal info with wrong (ECDH) key",0,null,null],["Derived key of type name: AES-GCM length: 128 using empty derivedKey, empty salt, SHA-512, with normal info",1,"assert_unreached: deriveKey failed with error TypeError: Argument 2 of SubtleCrypto.deriveKey is not an object. Reached unreachable code","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:79:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:69:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:68:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-GCM length: 128 using empty derivedKey, empty salt, SHA-512, with normal info with bad hash name SHA512",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"NotSupportedError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-GCM length: 128 using empty derivedKey, empty salt, SHA-512, with normal info with missing deriveKey usage",1,"assert_equals: deriveKey with missing deriveKey usage correctly threw InvalidAccessError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"InvalidAccessError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:104:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:100:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:99:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-GCM length: 128 using empty derivedKey, empty salt, SHA-512, with normal info with wrong (ECDH) key",0,null,null],["Derived key of type name: AES-GCM length: 192 using empty derivedKey, empty salt, SHA-512, with normal info",1,"assert_unreached: deriveKey failed with error TypeError: Argument 2 of SubtleCrypto.deriveKey is not an object. Reached unreachable code","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:79:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:69:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:68:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-GCM length: 192 using empty derivedKey, empty salt, SHA-512, with normal info with bad hash name SHA512",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"NotSupportedError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-GCM length: 192 using empty derivedKey, empty salt, SHA-512, with normal info with missing deriveKey usage",1,"assert_equals: deriveKey with missing deriveKey usage correctly threw InvalidAccessError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"InvalidAccessError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:104:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:100:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:99:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-GCM length: 192 using empty derivedKey, empty salt, SHA-512, with normal info with wrong (ECDH) key",0,null,null],["Derived key of type name: AES-GCM length: 256 using empty derivedKey, empty salt, SHA-512, with normal info",1,"assert_unreached: deriveKey failed with error TypeError: Argument 2 of SubtleCrypto.deriveKey is not an object. Reached unreachable code","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:79:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:69:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:68:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-GCM length: 256 using empty derivedKey, empty salt, SHA-512, with normal info with bad hash name SHA512",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"NotSupportedError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-GCM length: 256 using empty derivedKey, empty salt, SHA-512, with normal info with missing deriveKey usage",1,"assert_equals: deriveKey with missing deriveKey usage correctly threw InvalidAccessError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"InvalidAccessError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:104:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:100:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:99:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-GCM length: 256 using empty derivedKey, empty salt, SHA-512, with normal info with wrong (ECDH) key",0,null,null],["Derived key of type name: AES-KW length: 128 using empty derivedKey, empty salt, SHA-512, with normal info",1,"assert_unreached: deriveKey failed with error TypeError: Argument 2 of SubtleCrypto.deriveKey is not an object. Reached unreachable code","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:79:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:69:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:68:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-KW length: 128 using empty derivedKey, empty salt, SHA-512, with normal info with bad hash name SHA512",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"NotSupportedError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-KW length: 128 using empty derivedKey, empty salt, SHA-512, with normal info with missing deriveKey usage",1,"assert_equals: deriveKey with missing deriveKey usage correctly threw InvalidAccessError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"InvalidAccessError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:104:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:100:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:99:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-KW length: 128 using empty derivedKey, empty salt, SHA-512, with normal info with wrong (ECDH) key",0,null,null],["Derived key of type name: AES-KW length: 192 using empty derivedKey, empty salt, SHA-512, with normal info",1,"assert_unreached: deriveKey failed with error TypeError: Argument 2 of SubtleCrypto.deriveKey is not an object. Reached unreachable code","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:79:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:69:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:68:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-KW length: 192 using empty derivedKey, empty salt, SHA-512, with normal info with bad hash name SHA512",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"NotSupportedError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-KW length: 192 using empty derivedKey, empty salt, SHA-512, with normal info with missing deriveKey usage",1,"assert_equals: deriveKey with missing deriveKey usage correctly threw InvalidAccessError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"InvalidAccessError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:104:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:100:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:99:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-KW length: 192 using empty derivedKey, empty salt, SHA-512, with normal info with wrong (ECDH) key",0,null,null],["Derived key of type name: AES-KW length: 256 using empty derivedKey, empty salt, SHA-512, with normal info",1,"assert_unreached: deriveKey failed with error TypeError: Argument 2 of SubtleCrypto.deriveKey is not an object. Reached unreachable code","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:79:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:69:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:68:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-KW length: 256 using empty derivedKey, empty salt, SHA-512, with normal info with bad hash name SHA512",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"NotSupportedError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-KW length: 256 using empty derivedKey, empty salt, SHA-512, with normal info with missing deriveKey usage",1,"assert_equals: deriveKey with missing deriveKey usage correctly threw InvalidAccessError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"InvalidAccessError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:104:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:100:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:99:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-KW length: 256 using empty derivedKey, empty salt, SHA-512, with normal info with wrong (ECDH) key",0,null,null],["Derived key of type name: HMAC hash: SHA-1 length: 256 using empty derivedKey, empty salt, SHA-512, with normal info",1,"assert_unreached: deriveKey failed with error TypeError: Argument 2 of SubtleCrypto.deriveKey is not an object. Reached unreachable code","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:79:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:69:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:68:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: HMAC hash: SHA-1 length: 256 using empty derivedKey, empty salt, SHA-512, with normal info with bad hash name SHA512",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"NotSupportedError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: HMAC hash: SHA-1 length: 256 using empty derivedKey, empty salt, SHA-512, with normal info with missing deriveKey usage",1,"assert_equals: deriveKey with missing deriveKey usage correctly threw InvalidAccessError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"InvalidAccessError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:104:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:100:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:99:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: HMAC hash: SHA-1 length: 256 using empty derivedKey, empty salt, SHA-512, with normal info with wrong (ECDH) key",0,null,null],["Derived key of type name: HMAC hash: SHA-256 length: 256 using empty derivedKey, empty salt, SHA-512, with normal info",1,"assert_unreached: deriveKey failed with error TypeError: Argument 2 of SubtleCrypto.deriveKey is not an object. Reached unreachable code","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:79:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:69:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:68:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: HMAC hash: SHA-256 length: 256 using empty derivedKey, empty salt, SHA-512, with normal info with bad hash name SHA512",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"NotSupportedError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: HMAC hash: SHA-256 length: 256 using empty derivedKey, empty salt, SHA-512, with normal info with missing deriveKey usage",1,"assert_equals: deriveKey with missing deriveKey usage correctly threw InvalidAccessError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"InvalidAccessError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:104:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:100:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:99:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: HMAC hash: SHA-256 length: 256 using empty derivedKey, empty salt, SHA-512, with normal info with wrong (ECDH) key",0,null,null],["Derived key of type name: HMAC hash: SHA-384 length: 256 using empty derivedKey, empty salt, SHA-512, with normal info",1,"assert_unreached: deriveKey failed with error TypeError: Argument 2 of SubtleCrypto.deriveKey is not an object. Reached unreachable code","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:79:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:69:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:68:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: HMAC hash: SHA-384 length: 256 using empty derivedKey, empty salt, SHA-512, with normal info with bad hash name SHA512",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"NotSupportedError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: HMAC hash: SHA-384 length: 256 using empty derivedKey, empty salt, SHA-512, with normal info with missing deriveKey usage",1,"assert_equals: deriveKey with missing deriveKey usage correctly threw InvalidAccessError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"InvalidAccessError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:104:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:100:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:99:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: HMAC hash: SHA-384 length: 256 using empty derivedKey, empty salt, SHA-512, with normal info with wrong (ECDH) key",0,null,null],["Derived key of type name: HMAC hash: SHA-512 length: 256 using empty derivedKey, empty salt, SHA-512, with normal info",1,"assert_unreached: deriveKey failed with error TypeError: Argument 2 of SubtleCrypto.deriveKey is not an object. Reached unreachable code","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:79:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:69:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:68:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: HMAC hash: SHA-512 length: 256 using empty derivedKey, empty salt, SHA-512, with normal info with bad hash name SHA512",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"NotSupportedError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: HMAC hash: SHA-512 length: 256 using empty derivedKey, empty salt, SHA-512, with normal info with missing deriveKey usage",1,"assert_equals: deriveKey with missing deriveKey usage correctly threw InvalidAccessError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"InvalidAccessError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:104:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:100:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:99:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: HMAC hash: SHA-512 length: 256 using empty derivedKey, empty salt, SHA-512, with normal info with wrong (ECDH) key",0,null,null],["empty derivedKey, empty salt, SHA-512, with normal info with missing salt",0,null,null],["empty derivedKey, empty salt, SHA-512, with normal info with missing info",0,null,null],["empty derivedKey, empty salt, SHA-512, with normal info with null length",0,null,null],["empty derivedKey, empty salt, SHA-512, with normal info with non-multiple of 8 length",1,"assert_equals: deriveBits with non-multiple of 8 length correctly threw OperationError: Argument 2 of SubtleCrypto.deriveBits is not an object. expected \"OperationError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:158:33\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:154:36\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:153:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["empty derivedKey, empty salt, SHA-512, with normal info with bad hash name SHA512",1,"assert_equals: deriveBits with bad hash name correctly threw NotSupportedError: Argument 2 of SubtleCrypto.deriveBits is not an object. expected \"NotSupportedError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:170:33\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:166:36\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:164:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["empty derivedKey, empty salt, SHA-512, with normal info with missing deriveBits usage",1,"assert_equals: deriveBits with missing deriveBits usage correctly threw InvalidAccessError: Argument 2 of SubtleCrypto.deriveBits is not an object. expected \"InvalidAccessError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:180:33\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:176:36\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:175:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["empty derivedKey, empty salt, SHA-512, with normal info with wrong (ECDH) key",0,null,null],["empty derivedKey, empty salt, SHA-512, with empty info",1,"assert_unreached: deriveBits failed with error TypeError: Argument 2 of SubtleCrypto.deriveBits is not an object. Reached unreachable code","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:44:33\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:40:36\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:39:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["empty derivedKey, empty salt, SHA-512, with empty info with 0 length",1,"assert_equals: deriveBits with 0 length correctly threw OperationError: Argument 2 of SubtleCrypto.deriveBits is not an object. expected \"OperationError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:54:33\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:50:36\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:49:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-CBC length: 128 using empty derivedKey, empty salt, SHA-512, with empty info",1,"assert_unreached: deriveKey failed with error TypeError: Argument 2 of SubtleCrypto.deriveKey is not an object. Reached unreachable code","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:79:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:69:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:68:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-CBC length: 128 using empty derivedKey, empty salt, SHA-512, with empty info with bad hash name SHA512",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"NotSupportedError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-CBC length: 128 using empty derivedKey, empty salt, SHA-512, with empty info with missing deriveKey usage",1,"assert_equals: deriveKey with missing deriveKey usage correctly threw InvalidAccessError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"InvalidAccessError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:104:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:100:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:99:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-CBC length: 128 using empty derivedKey, empty salt, SHA-512, with empty info with wrong (ECDH) key",0,null,null],["Derived key of type name: AES-CBC length: 192 using empty derivedKey, empty salt, SHA-512, with empty info",1,"assert_unreached: deriveKey failed with error TypeError: Argument 2 of SubtleCrypto.deriveKey is not an object. Reached unreachable code","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:79:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:69:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:68:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-CBC length: 192 using empty derivedKey, empty salt, SHA-512, with empty info with bad hash name SHA512",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"NotSupportedError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-CBC length: 192 using empty derivedKey, empty salt, SHA-512, with empty info with missing deriveKey usage",1,"assert_equals: deriveKey with missing deriveKey usage correctly threw InvalidAccessError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"InvalidAccessError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:104:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:100:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:99:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-CBC length: 192 using empty derivedKey, empty salt, SHA-512, with empty info with wrong (ECDH) key",0,null,null],["Derived key of type name: AES-CBC length: 256 using empty derivedKey, empty salt, SHA-512, with empty info",1,"assert_unreached: deriveKey failed with error TypeError: Argument 2 of SubtleCrypto.deriveKey is not an object. Reached unreachable code","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:79:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:69:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:68:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-CBC length: 256 using empty derivedKey, empty salt, SHA-512, with empty info with bad hash name SHA512",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"NotSupportedError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-CBC length: 256 using empty derivedKey, empty salt, SHA-512, with empty info with missing deriveKey usage",1,"assert_equals: deriveKey with missing deriveKey usage correctly threw InvalidAccessError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"InvalidAccessError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:104:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:100:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:99:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-CBC length: 256 using empty derivedKey, empty salt, SHA-512, with empty info with wrong (ECDH) key",0,null,null],["Derived key of type name: AES-CTR length: 128 using empty derivedKey, empty salt, SHA-512, with empty info",1,"assert_unreached: deriveKey failed with error TypeError: Argument 2 of SubtleCrypto.deriveKey is not an object. Reached unreachable code","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:79:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:69:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:68:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-CTR length: 128 using empty derivedKey, empty salt, SHA-512, with empty info with bad hash name SHA512",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"NotSupportedError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-CTR length: 128 using empty derivedKey, empty salt, SHA-512, with empty info with missing deriveKey usage",1,"assert_equals: deriveKey with missing deriveKey usage correctly threw InvalidAccessError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"InvalidAccessError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:104:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:100:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:99:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-CTR length: 128 using empty derivedKey, empty salt, SHA-512, with empty info with wrong (ECDH) key",0,null,null],["Derived key of type name: AES-CTR length: 192 using empty derivedKey, empty salt, SHA-512, with empty info",1,"assert_unreached: deriveKey failed with error TypeError: Argument 2 of SubtleCrypto.deriveKey is not an object. Reached unreachable code","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:79:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:69:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:68:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-CTR length: 192 using empty derivedKey, empty salt, SHA-512, with empty info with bad hash name SHA512",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"NotSupportedError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-CTR length: 192 using empty derivedKey, empty salt, SHA-512, with empty info with missing deriveKey usage",1,"assert_equals: deriveKey with missing deriveKey usage correctly threw InvalidAccessError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"InvalidAccessError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:104:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:100:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:99:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-CTR length: 192 using empty derivedKey, empty salt, SHA-512, with empty info with wrong (ECDH) key",0,null,null],["Derived key of type name: AES-CTR length: 256 using empty derivedKey, empty salt, SHA-512, with empty info",1,"assert_unreached: deriveKey failed with error TypeError: Argument 2 of SubtleCrypto.deriveKey is not an object. Reached unreachable code","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:79:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:69:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:68:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-CTR length: 256 using empty derivedKey, empty salt, SHA-512, with empty info with bad hash name SHA512",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"NotSupportedError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-CTR length: 256 using empty derivedKey, empty salt, SHA-512, with empty info with missing deriveKey usage",1,"assert_equals: deriveKey with missing deriveKey usage correctly threw InvalidAccessError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"InvalidAccessError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:104:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:100:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:99:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-CTR length: 256 using empty derivedKey, empty salt, SHA-512, with empty info with wrong (ECDH) key",0,null,null],["Derived key of type name: AES-GCM length: 128 using empty derivedKey, empty salt, SHA-512, with empty info",1,"assert_unreached: deriveKey failed with error TypeError: Argument 2 of SubtleCrypto.deriveKey is not an object. Reached unreachable code","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:79:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:69:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:68:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-GCM length: 128 using empty derivedKey, empty salt, SHA-512, with empty info with bad hash name SHA512",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"NotSupportedError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-GCM length: 128 using empty derivedKey, empty salt, SHA-512, with empty info with missing deriveKey usage",1,"assert_equals: deriveKey with missing deriveKey usage correctly threw InvalidAccessError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"InvalidAccessError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:104:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:100:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:99:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-GCM length: 128 using empty derivedKey, empty salt, SHA-512, with empty info with wrong (ECDH) key",0,null,null],["Derived key of type name: AES-GCM length: 192 using empty derivedKey, empty salt, SHA-512, with empty info",1,"assert_unreached: deriveKey failed with error TypeError: Argument 2 of SubtleCrypto.deriveKey is not an object. Reached unreachable code","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:79:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:69:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:68:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-GCM length: 192 using empty derivedKey, empty salt, SHA-512, with empty info with bad hash name SHA512",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"NotSupportedError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-GCM length: 192 using empty derivedKey, empty salt, SHA-512, with empty info with missing deriveKey usage",1,"assert_equals: deriveKey with missing deriveKey usage correctly threw InvalidAccessError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"InvalidAccessError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:104:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:100:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:99:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-GCM length: 192 using empty derivedKey, empty salt, SHA-512, with empty info with wrong (ECDH) key",0,null,null],["Derived key of type name: AES-GCM length: 256 using empty derivedKey, empty salt, SHA-512, with empty info",1,"assert_unreached: deriveKey failed with error TypeError: Argument 2 of SubtleCrypto.deriveKey is not an object. Reached unreachable code","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:79:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:69:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:68:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-GCM length: 256 using empty derivedKey, empty salt, SHA-512, with empty info with bad hash name SHA512",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"NotSupportedError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-GCM length: 256 using empty derivedKey, empty salt, SHA-512, with empty info with missing deriveKey usage",1,"assert_equals: deriveKey with missing deriveKey usage correctly threw InvalidAccessError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"InvalidAccessError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:104:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:100:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:99:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-GCM length: 256 using empty derivedKey, empty salt, SHA-512, with empty info with wrong (ECDH) key",0,null,null],["Derived key of type name: AES-KW length: 128 using empty derivedKey, empty salt, SHA-512, with empty info",1,"assert_unreached: deriveKey failed with error TypeError: Argument 2 of SubtleCrypto.deriveKey is not an object. Reached unreachable code","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:79:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:69:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:68:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-KW length: 128 using empty derivedKey, empty salt, SHA-512, with empty info with bad hash name SHA512",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"NotSupportedError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-KW length: 128 using empty derivedKey, empty salt, SHA-512, with empty info with missing deriveKey usage",1,"assert_equals: deriveKey with missing deriveKey usage correctly threw InvalidAccessError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"InvalidAccessError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:104:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:100:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:99:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-KW length: 128 using empty derivedKey, empty salt, SHA-512, with empty info with wrong (ECDH) key",0,null,null],["Derived key of type name: AES-KW length: 192 using empty derivedKey, empty salt, SHA-512, with empty info",1,"assert_unreached: deriveKey failed with error TypeError: Argument 2 of SubtleCrypto.deriveKey is not an object. Reached unreachable code","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:79:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:69:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:68:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-KW length: 192 using empty derivedKey, empty salt, SHA-512, with empty info with bad hash name SHA512",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"NotSupportedError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-KW length: 192 using empty derivedKey, empty salt, SHA-512, with empty info with missing deriveKey usage",1,"assert_equals: deriveKey with missing deriveKey usage correctly threw InvalidAccessError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"InvalidAccessError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:104:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:100:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:99:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-KW length: 192 using empty derivedKey, empty salt, SHA-512, with empty info with wrong (ECDH) key",0,null,null],["Derived key of type name: AES-KW length: 256 using empty derivedKey, empty salt, SHA-512, with empty info",1,"assert_unreached: deriveKey failed with error TypeError: Argument 2 of SubtleCrypto.deriveKey is not an object. Reached unreachable code","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:79:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:69:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:68:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-KW length: 256 using empty derivedKey, empty salt, SHA-512, with empty info with bad hash name SHA512",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"NotSupportedError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-KW length: 256 using empty derivedKey, empty salt, SHA-512, with empty info with missing deriveKey usage",1,"assert_equals: deriveKey with missing deriveKey usage correctly threw InvalidAccessError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"InvalidAccessError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:104:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:100:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:99:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-KW length: 256 using empty derivedKey, empty salt, SHA-512, with empty info with wrong (ECDH) key",0,null,null],["Derived key of type name: HMAC hash: SHA-1 length: 256 using empty derivedKey, empty salt, SHA-512, with empty info",1,"assert_unreached: deriveKey failed with error TypeError: Argument 2 of SubtleCrypto.deriveKey is not an object. Reached unreachable code","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:79:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:69:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:68:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: HMAC hash: SHA-1 length: 256 using empty derivedKey, empty salt, SHA-512, with empty info with bad hash name SHA512",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"NotSupportedError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: HMAC hash: SHA-1 length: 256 using empty derivedKey, empty salt, SHA-512, with empty info with missing deriveKey usage",1,"assert_equals: deriveKey with missing deriveKey usage correctly threw InvalidAccessError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"InvalidAccessError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:104:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:100:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:99:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: HMAC hash: SHA-1 length: 256 using empty derivedKey, empty salt, SHA-512, with empty info with wrong (ECDH) key",0,null,null],["Derived key of type name: HMAC hash: SHA-256 length: 256 using empty derivedKey, empty salt, SHA-512, with empty info",1,"assert_unreached: deriveKey failed with error TypeError: Argument 2 of SubtleCrypto.deriveKey is not an object. Reached unreachable code","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:79:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:69:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:68:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: HMAC hash: SHA-256 length: 256 using empty derivedKey, empty salt, SHA-512, with empty info with bad hash name SHA512",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"NotSupportedError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: HMAC hash: SHA-256 length: 256 using empty derivedKey, empty salt, SHA-512, with empty info with missing deriveKey usage",1,"assert_equals: deriveKey with missing deriveKey usage correctly threw InvalidAccessError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"InvalidAccessError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:104:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:100:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:99:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: HMAC hash: SHA-256 length: 256 using empty derivedKey, empty salt, SHA-512, with empty info with wrong (ECDH) key",0,null,null],["Derived key of type name: HMAC hash: SHA-384 length: 256 using empty derivedKey, empty salt, SHA-512, with empty info",1,"assert_unreached: deriveKey failed with error TypeError: Argument 2 of SubtleCrypto.deriveKey is not an object. Reached unreachable code","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:79:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:69:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:68:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: HMAC hash: SHA-384 length: 256 using empty derivedKey, empty salt, SHA-512, with empty info with bad hash name SHA512",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"NotSupportedError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: HMAC hash: SHA-384 length: 256 using empty derivedKey, empty salt, SHA-512, with empty info with missing deriveKey usage",1,"assert_equals: deriveKey with missing deriveKey usage correctly threw InvalidAccessError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"InvalidAccessError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:104:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:100:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:99:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: HMAC hash: SHA-384 length: 256 using empty derivedKey, empty salt, SHA-512, with empty info with wrong (ECDH) key",0,null,null],["Derived key of type name: HMAC hash: SHA-512 length: 256 using empty derivedKey, empty salt, SHA-512, with empty info",1,"assert_unreached: deriveKey failed with error TypeError: Argument 2 of SubtleCrypto.deriveKey is not an object. Reached unreachable code","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:79:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:69:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:68:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: HMAC hash: SHA-512 length: 256 using empty derivedKey, empty salt, SHA-512, with empty info with bad hash name SHA512",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"NotSupportedError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: HMAC hash: SHA-512 length: 256 using empty derivedKey, empty salt, SHA-512, with empty info with missing deriveKey usage",1,"assert_equals: deriveKey with missing deriveKey usage correctly threw InvalidAccessError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"InvalidAccessError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:104:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:100:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:99:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: HMAC hash: SHA-512 length: 256 using empty derivedKey, empty salt, SHA-512, with empty info with wrong (ECDH) key",0,null,null],["empty derivedKey, empty salt, SHA-512, with empty info with missing salt",0,null,null],["empty derivedKey, empty salt, SHA-512, with empty info with missing info",0,null,null],["empty derivedKey, empty salt, SHA-512, with empty info with null length",0,null,null],["empty derivedKey, empty salt, SHA-512, with empty info with non-multiple of 8 length",1,"assert_equals: deriveBits with non-multiple of 8 length correctly threw OperationError: Argument 2 of SubtleCrypto.deriveBits is not an object. expected \"OperationError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:158:33\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:154:36\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:153:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["empty derivedKey, empty salt, SHA-512, with empty info with bad hash name SHA512",1,"assert_equals: deriveBits with bad hash name correctly threw NotSupportedError: Argument 2 of SubtleCrypto.deriveBits is not an object. expected \"NotSupportedError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:170:33\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:166:36\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:164:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["empty derivedKey, empty salt, SHA-512, with empty info with missing deriveBits usage",1,"assert_equals: deriveBits with missing deriveBits usage correctly threw InvalidAccessError: Argument 2 of SubtleCrypto.deriveBits is not an object. expected \"InvalidAccessError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:180:33\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:176:36\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:175:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["empty derivedKey, empty salt, SHA-512, with empty info with wrong (ECDH) key",0,null,null],["empty derivedKey, empty salt, SHA-1, with normal info",1,"assert_unreached: deriveBits failed with error TypeError: Argument 2 of SubtleCrypto.deriveBits is not an object. Reached unreachable code","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:44:33\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:40:36\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:39:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["empty derivedKey, empty salt, SHA-1, with normal info with 0 length",1,"assert_equals: deriveBits with 0 length correctly threw OperationError: Argument 2 of SubtleCrypto.deriveBits is not an object. expected \"OperationError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:54:33\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:50:36\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:49:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-CBC length: 128 using empty derivedKey, empty salt, SHA-1, with normal info",1,"assert_unreached: deriveKey failed with error TypeError: Argument 2 of SubtleCrypto.deriveKey is not an object. Reached unreachable code","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:79:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:69:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:68:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-CBC length: 128 using empty derivedKey, empty salt, SHA-1, with normal info with bad hash name SHA1",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"NotSupportedError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-CBC length: 128 using empty derivedKey, empty salt, SHA-1, with normal info with missing deriveKey usage",1,"assert_equals: deriveKey with missing deriveKey usage correctly threw InvalidAccessError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"InvalidAccessError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:104:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:100:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:99:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-CBC length: 128 using empty derivedKey, empty salt, SHA-1, with normal info with wrong (ECDH) key",0,null,null],["Derived key of type name: AES-CBC length: 192 using empty derivedKey, empty salt, SHA-1, with normal info",1,"assert_unreached: deriveKey failed with error TypeError: Argument 2 of SubtleCrypto.deriveKey is not an object. Reached unreachable code","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:79:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:69:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:68:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-CBC length: 192 using empty derivedKey, empty salt, SHA-1, with normal info with bad hash name SHA1",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"NotSupportedError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-CBC length: 192 using empty derivedKey, empty salt, SHA-1, with normal info with missing deriveKey usage",1,"assert_equals: deriveKey with missing deriveKey usage correctly threw InvalidAccessError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"InvalidAccessError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:104:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:100:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:99:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-CBC length: 192 using empty derivedKey, empty salt, SHA-1, with normal info with wrong (ECDH) key",0,null,null],["Derived key of type name: AES-CBC length: 256 using empty derivedKey, empty salt, SHA-1, with normal info",1,"assert_unreached: deriveKey failed with error TypeError: Argument 2 of SubtleCrypto.deriveKey is not an object. Reached unreachable code","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:79:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:69:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:68:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-CBC length: 256 using empty derivedKey, empty salt, SHA-1, with normal info with bad hash name SHA1",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"NotSupportedError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-CBC length: 256 using empty derivedKey, empty salt, SHA-1, with normal info with missing deriveKey usage",1,"assert_equals: deriveKey with missing deriveKey usage correctly threw InvalidAccessError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"InvalidAccessError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:104:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:100:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:99:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-CBC length: 256 using empty derivedKey, empty salt, SHA-1, with normal info with wrong (ECDH) key",0,null,null],["Derived key of type name: AES-CTR length: 128 using empty derivedKey, empty salt, SHA-1, with normal info",1,"assert_unreached: deriveKey failed with error TypeError: Argument 2 of SubtleCrypto.deriveKey is not an object. Reached unreachable code","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:79:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:69:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:68:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-CTR length: 128 using empty derivedKey, empty salt, SHA-1, with normal info with bad hash name SHA1",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"NotSupportedError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-CTR length: 128 using empty derivedKey, empty salt, SHA-1, with normal info with missing deriveKey usage",1,"assert_equals: deriveKey with missing deriveKey usage correctly threw InvalidAccessError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"InvalidAccessError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:104:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:100:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:99:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-CTR length: 128 using empty derivedKey, empty salt, SHA-1, with normal info with wrong (ECDH) key",0,null,null],["Derived key of type name: AES-CTR length: 192 using empty derivedKey, empty salt, SHA-1, with normal info",1,"assert_unreached: deriveKey failed with error TypeError: Argument 2 of SubtleCrypto.deriveKey is not an object. Reached unreachable code","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:79:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:69:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:68:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-CTR length: 192 using empty derivedKey, empty salt, SHA-1, with normal info with bad hash name SHA1",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"NotSupportedError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-CTR length: 192 using empty derivedKey, empty salt, SHA-1, with normal info with missing deriveKey usage",1,"assert_equals: deriveKey with missing deriveKey usage correctly threw InvalidAccessError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"InvalidAccessError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:104:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:100:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:99:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-CTR length: 192 using empty derivedKey, empty salt, SHA-1, with normal info with wrong (ECDH) key",0,null,null],["Derived key of type name: AES-CTR length: 256 using empty derivedKey, empty salt, SHA-1, with normal info",1,"assert_unreached: deriveKey failed with error TypeError: Argument 2 of SubtleCrypto.deriveKey is not an object. Reached unreachable code","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:79:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:69:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:68:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-CTR length: 256 using empty derivedKey, empty salt, SHA-1, with normal info with bad hash name SHA1",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"NotSupportedError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-CTR length: 256 using empty derivedKey, empty salt, SHA-1, with normal info with missing deriveKey usage",1,"assert_equals: deriveKey with missing deriveKey usage correctly threw InvalidAccessError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"InvalidAccessError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:104:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:100:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:99:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-CTR length: 256 using empty derivedKey, empty salt, SHA-1, with normal info with wrong (ECDH) key",0,null,null],["Derived key of type name: AES-GCM length: 128 using empty derivedKey, empty salt, SHA-1, with normal info",1,"assert_unreached: deriveKey failed with error TypeError: Argument 2 of SubtleCrypto.deriveKey is not an object. Reached unreachable code","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:79:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:69:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:68:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-GCM length: 128 using empty derivedKey, empty salt, SHA-1, with normal info with bad hash name SHA1",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"NotSupportedError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-GCM length: 128 using empty derivedKey, empty salt, SHA-1, with normal info with missing deriveKey usage",1,"assert_equals: deriveKey with missing deriveKey usage correctly threw InvalidAccessError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"InvalidAccessError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:104:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:100:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:99:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-GCM length: 128 using empty derivedKey, empty salt, SHA-1, with normal info with wrong (ECDH) key",0,null,null],["Derived key of type name: AES-GCM length: 192 using empty derivedKey, empty salt, SHA-1, with normal info",1,"assert_unreached: deriveKey failed with error TypeError: Argument 2 of SubtleCrypto.deriveKey is not an object. Reached unreachable code","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:79:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:69:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:68:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-GCM length: 192 using empty derivedKey, empty salt, SHA-1, with normal info with bad hash name SHA1",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"NotSupportedError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-GCM length: 192 using empty derivedKey, empty salt, SHA-1, with normal info with missing deriveKey usage",1,"assert_equals: deriveKey with missing deriveKey usage correctly threw InvalidAccessError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"InvalidAccessError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:104:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:100:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:99:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-GCM length: 192 using empty derivedKey, empty salt, SHA-1, with normal info with wrong (ECDH) key",0,null,null],["Derived key of type name: AES-GCM length: 256 using empty derivedKey, empty salt, SHA-1, with normal info",1,"assert_unreached: deriveKey failed with error TypeError: Argument 2 of SubtleCrypto.deriveKey is not an object. Reached unreachable code","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:79:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:69:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:68:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-GCM length: 256 using empty derivedKey, empty salt, SHA-1, with normal info with bad hash name SHA1",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"NotSupportedError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-GCM length: 256 using empty derivedKey, empty salt, SHA-1, with normal info with missing deriveKey usage",1,"assert_equals: deriveKey with missing deriveKey usage correctly threw InvalidAccessError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"InvalidAccessError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:104:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:100:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:99:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-GCM length: 256 using empty derivedKey, empty salt, SHA-1, with normal info with wrong (ECDH) key",0,null,null],["Derived key of type name: AES-KW length: 128 using empty derivedKey, empty salt, SHA-1, with normal info",1,"assert_unreached: deriveKey failed with error TypeError: Argument 2 of SubtleCrypto.deriveKey is not an object. Reached unreachable code","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:79:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:69:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:68:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-KW length: 128 using empty derivedKey, empty salt, SHA-1, with normal info with bad hash name SHA1",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"NotSupportedError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-KW length: 128 using empty derivedKey, empty salt, SHA-1, with normal info with missing deriveKey usage",1,"assert_equals: deriveKey with missing deriveKey usage correctly threw InvalidAccessError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"InvalidAccessError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:104:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:100:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:99:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-KW length: 128 using empty derivedKey, empty salt, SHA-1, with normal info with wrong (ECDH) key",0,null,null],["Derived key of type name: AES-KW length: 192 using empty derivedKey, empty salt, SHA-1, with normal info",1,"assert_unreached: deriveKey failed with error TypeError: Argument 2 of SubtleCrypto.deriveKey is not an object. Reached unreachable code","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:79:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:69:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:68:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-KW length: 192 using empty derivedKey, empty salt, SHA-1, with normal info with bad hash name SHA1",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"NotSupportedError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-KW length: 192 using empty derivedKey, empty salt, SHA-1, with normal info with missing deriveKey usage",1,"assert_equals: deriveKey with missing deriveKey usage correctly threw InvalidAccessError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"InvalidAccessError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:104:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:100:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:99:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-KW length: 192 using empty derivedKey, empty salt, SHA-1, with normal info with wrong (ECDH) key",0,null,null],["Derived key of type name: AES-KW length: 256 using empty derivedKey, empty salt, SHA-1, with normal info",1,"assert_unreached: deriveKey failed with error TypeError: Argument 2 of SubtleCrypto.deriveKey is not an object. Reached unreachable code","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:79:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:69:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:68:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-KW length: 256 using empty derivedKey, empty salt, SHA-1, with normal info with bad hash name SHA1",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"NotSupportedError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-KW length: 256 using empty derivedKey, empty salt, SHA-1, with normal info with missing deriveKey usage",1,"assert_equals: deriveKey with missing deriveKey usage correctly threw InvalidAccessError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"InvalidAccessError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:104:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:100:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:99:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-KW length: 256 using empty derivedKey, empty salt, SHA-1, with normal info with wrong (ECDH) key",0,null,null],["Derived key of type name: HMAC hash: SHA-1 length: 256 using empty derivedKey, empty salt, SHA-1, with normal info",1,"assert_unreached: deriveKey failed with error TypeError: Argument 2 of SubtleCrypto.deriveKey is not an object. Reached unreachable code","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:79:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:69:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:68:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: HMAC hash: SHA-1 length: 256 using empty derivedKey, empty salt, SHA-1, with normal info with bad hash name SHA1",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"NotSupportedError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: HMAC hash: SHA-1 length: 256 using empty derivedKey, empty salt, SHA-1, with normal info with missing deriveKey usage",1,"assert_equals: deriveKey with missing deriveKey usage correctly threw InvalidAccessError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"InvalidAccessError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:104:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:100:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:99:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: HMAC hash: SHA-1 length: 256 using empty derivedKey, empty salt, SHA-1, with normal info with wrong (ECDH) key",0,null,null],["Derived key of type name: HMAC hash: SHA-256 length: 256 using empty derivedKey, empty salt, SHA-1, with normal info",1,"assert_unreached: deriveKey failed with error TypeError: Argument 2 of SubtleCrypto.deriveKey is not an object. Reached unreachable code","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:79:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:69:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:68:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: HMAC hash: SHA-256 length: 256 using empty derivedKey, empty salt, SHA-1, with normal info with bad hash name SHA1",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"NotSupportedError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: HMAC hash: SHA-256 length: 256 using empty derivedKey, empty salt, SHA-1, with normal info with missing deriveKey usage",1,"assert_equals: deriveKey with missing deriveKey usage correctly threw InvalidAccessError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"InvalidAccessError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:104:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:100:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:99:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: HMAC hash: SHA-256 length: 256 using empty derivedKey, empty salt, SHA-1, with normal info with wrong (ECDH) key",0,null,null],["Derived key of type name: HMAC hash: SHA-384 length: 256 using empty derivedKey, empty salt, SHA-1, with normal info",1,"assert_unreached: deriveKey failed with error TypeError: Argument 2 of SubtleCrypto.deriveKey is not an object. Reached unreachable code","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:79:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:69:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:68:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: HMAC hash: SHA-384 length: 256 using empty derivedKey, empty salt, SHA-1, with normal info with bad hash name SHA1",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"NotSupportedError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: HMAC hash: SHA-384 length: 256 using empty derivedKey, empty salt, SHA-1, with normal info with missing deriveKey usage",1,"assert_equals: deriveKey with missing deriveKey usage correctly threw InvalidAccessError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"InvalidAccessError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:104:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:100:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:99:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: HMAC hash: SHA-384 length: 256 using empty derivedKey, empty salt, SHA-1, with normal info with wrong (ECDH) key",0,null,null],["Derived key of type name: HMAC hash: SHA-512 length: 256 using empty derivedKey, empty salt, SHA-1, with normal info",1,"assert_unreached: deriveKey failed with error TypeError: Argument 2 of SubtleCrypto.deriveKey is not an object. Reached unreachable code","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:79:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:69:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:68:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: HMAC hash: SHA-512 length: 256 using empty derivedKey, empty salt, SHA-1, with normal info with bad hash name SHA1",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"NotSupportedError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: HMAC hash: SHA-512 length: 256 using empty derivedKey, empty salt, SHA-1, with normal info with missing deriveKey usage",1,"assert_equals: deriveKey with missing deriveKey usage correctly threw InvalidAccessError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"InvalidAccessError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:104:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:100:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:99:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: HMAC hash: SHA-512 length: 256 using empty derivedKey, empty salt, SHA-1, with normal info with wrong (ECDH) key",0,null,null],["empty derivedKey, empty salt, SHA-1, with normal info with missing salt",0,null,null],["empty derivedKey, empty salt, SHA-1, with normal info with missing info",0,null,null],["empty derivedKey, empty salt, SHA-1, with normal info with null length",0,null,null],["empty derivedKey, empty salt, SHA-1, with normal info with non-multiple of 8 length",1,"assert_equals: deriveBits with non-multiple of 8 length correctly threw OperationError: Argument 2 of SubtleCrypto.deriveBits is not an object. expected \"OperationError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:158:33\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:154:36\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:153:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["empty derivedKey, empty salt, SHA-1, with normal info with bad hash name SHA1",1,"assert_equals: deriveBits with bad hash name correctly threw NotSupportedError: Argument 2 of SubtleCrypto.deriveBits is not an object. expected \"NotSupportedError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:170:33\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:166:36\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:164:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["empty derivedKey, empty salt, SHA-1, with normal info with missing deriveBits usage",1,"assert_equals: deriveBits with missing deriveBits usage correctly threw InvalidAccessError: Argument 2 of SubtleCrypto.deriveBits is not an object. expected \"InvalidAccessError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:180:33\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:176:36\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:175:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["empty derivedKey, empty salt, SHA-1, with normal info with wrong (ECDH) key",0,null,null],["empty derivedKey, empty salt, SHA-1, with empty info",1,"assert_unreached: deriveBits failed with error TypeError: Argument 2 of SubtleCrypto.deriveBits is not an object. Reached unreachable code","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:44:33\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:40:36\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:39:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["empty derivedKey, empty salt, SHA-1, with empty info with 0 length",1,"assert_equals: deriveBits with 0 length correctly threw OperationError: Argument 2 of SubtleCrypto.deriveBits is not an object. expected \"OperationError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:54:33\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:50:36\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:49:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-CBC length: 128 using empty derivedKey, empty salt, SHA-1, with empty info",1,"assert_unreached: deriveKey failed with error TypeError: Argument 2 of SubtleCrypto.deriveKey is not an object. Reached unreachable code","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:79:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:69:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:68:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-CBC length: 128 using empty derivedKey, empty salt, SHA-1, with empty info with bad hash name SHA1",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"NotSupportedError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-CBC length: 128 using empty derivedKey, empty salt, SHA-1, with empty info with missing deriveKey usage",1,"assert_equals: deriveKey with missing deriveKey usage correctly threw InvalidAccessError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"InvalidAccessError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:104:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:100:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:99:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-CBC length: 128 using empty derivedKey, empty salt, SHA-1, with empty info with wrong (ECDH) key",0,null,null],["Derived key of type name: AES-CBC length: 192 using empty derivedKey, empty salt, SHA-1, with empty info",1,"assert_unreached: deriveKey failed with error TypeError: Argument 2 of SubtleCrypto.deriveKey is not an object. Reached unreachable code","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:79:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:69:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:68:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-CBC length: 192 using empty derivedKey, empty salt, SHA-1, with empty info with bad hash name SHA1",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"NotSupportedError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-CBC length: 192 using empty derivedKey, empty salt, SHA-1, with empty info with missing deriveKey usage",1,"assert_equals: deriveKey with missing deriveKey usage correctly threw InvalidAccessError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"InvalidAccessError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:104:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:100:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:99:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-CBC length: 192 using empty derivedKey, empty salt, SHA-1, with empty info with wrong (ECDH) key",0,null,null],["Derived key of type name: AES-CBC length: 256 using empty derivedKey, empty salt, SHA-1, with empty info",1,"assert_unreached: deriveKey failed with error TypeError: Argument 2 of SubtleCrypto.deriveKey is not an object. Reached unreachable code","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:79:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:69:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:68:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-CBC length: 256 using empty derivedKey, empty salt, SHA-1, with empty info with bad hash name SHA1",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"NotSupportedError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-CBC length: 256 using empty derivedKey, empty salt, SHA-1, with empty info with missing deriveKey usage",1,"assert_equals: deriveKey with missing deriveKey usage correctly threw InvalidAccessError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"InvalidAccessError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:104:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:100:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:99:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-CBC length: 256 using empty derivedKey, empty salt, SHA-1, with empty info with wrong (ECDH) key",0,null,null],["Derived key of type name: AES-CTR length: 128 using empty derivedKey, empty salt, SHA-1, with empty info",1,"assert_unreached: deriveKey failed with error TypeError: Argument 2 of SubtleCrypto.deriveKey is not an object. Reached unreachable code","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:79:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:69:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:68:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-CTR length: 128 using empty derivedKey, empty salt, SHA-1, with empty info with bad hash name SHA1",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"NotSupportedError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-CTR length: 128 using empty derivedKey, empty salt, SHA-1, with empty info with missing deriveKey usage",1,"assert_equals: deriveKey with missing deriveKey usage correctly threw InvalidAccessError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"InvalidAccessError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:104:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:100:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:99:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-CTR length: 128 using empty derivedKey, empty salt, SHA-1, with empty info with wrong (ECDH) key",0,null,null],["Derived key of type name: AES-CTR length: 192 using empty derivedKey, empty salt, SHA-1, with empty info",1,"assert_unreached: deriveKey failed with error TypeError: Argument 2 of SubtleCrypto.deriveKey is not an object. Reached unreachable code","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:79:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:69:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:68:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-CTR length: 192 using empty derivedKey, empty salt, SHA-1, with empty info with bad hash name SHA1",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"NotSupportedError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-CTR length: 192 using empty derivedKey, empty salt, SHA-1, with empty info with missing deriveKey usage",1,"assert_equals: deriveKey with missing deriveKey usage correctly threw InvalidAccessError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"InvalidAccessError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:104:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:100:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:99:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-CTR length: 192 using empty derivedKey, empty salt, SHA-1, with empty info with wrong (ECDH) key",0,null,null],["Derived key of type name: AES-CTR length: 256 using empty derivedKey, empty salt, SHA-1, with empty info",1,"assert_unreached: deriveKey failed with error TypeError: Argument 2 of SubtleCrypto.deriveKey is not an object. Reached unreachable code","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:79:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:69:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:68:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-CTR length: 256 using empty derivedKey, empty salt, SHA-1, with empty info with bad hash name SHA1",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"NotSupportedError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-CTR length: 256 using empty derivedKey, empty salt, SHA-1, with empty info with missing deriveKey usage",1,"assert_equals: deriveKey with missing deriveKey usage correctly threw InvalidAccessError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"InvalidAccessError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:104:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:100:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:99:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-CTR length: 256 using empty derivedKey, empty salt, SHA-1, with empty info with wrong (ECDH) key",0,null,null],["Derived key of type name: AES-GCM length: 128 using empty derivedKey, empty salt, SHA-1, with empty info",1,"assert_unreached: deriveKey failed with error TypeError: Argument 2 of SubtleCrypto.deriveKey is not an object. Reached unreachable code","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:79:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:69:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:68:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-GCM length: 128 using empty derivedKey, empty salt, SHA-1, with empty info with bad hash name SHA1",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"NotSupportedError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-GCM length: 128 using empty derivedKey, empty salt, SHA-1, with empty info with missing deriveKey usage",1,"assert_equals: deriveKey with missing deriveKey usage correctly threw InvalidAccessError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"InvalidAccessError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:104:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:100:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:99:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-GCM length: 128 using empty derivedKey, empty salt, SHA-1, with empty info with wrong (ECDH) key",0,null,null],["Derived key of type name: AES-GCM length: 192 using empty derivedKey, empty salt, SHA-1, with empty info",1,"assert_unreached: deriveKey failed with error TypeError: Argument 2 of SubtleCrypto.deriveKey is not an object. Reached unreachable code","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:79:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:69:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:68:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-GCM length: 192 using empty derivedKey, empty salt, SHA-1, with empty info with bad hash name SHA1",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"NotSupportedError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-GCM length: 192 using empty derivedKey, empty salt, SHA-1, with empty info with missing deriveKey usage",1,"assert_equals: deriveKey with missing deriveKey usage correctly threw InvalidAccessError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"InvalidAccessError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:104:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:100:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:99:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-GCM length: 192 using empty derivedKey, empty salt, SHA-1, with empty info with wrong (ECDH) key",0,null,null],["Derived key of type name: AES-GCM length: 256 using empty derivedKey, empty salt, SHA-1, with empty info",1,"assert_unreached: deriveKey failed with error TypeError: Argument 2 of SubtleCrypto.deriveKey is not an object. Reached unreachable code","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:79:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:69:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:68:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-GCM length: 256 using empty derivedKey, empty salt, SHA-1, with empty info with bad hash name SHA1",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"NotSupportedError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-GCM length: 256 using empty derivedKey, empty salt, SHA-1, with empty info with missing deriveKey usage",1,"assert_equals: deriveKey with missing deriveKey usage correctly threw InvalidAccessError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"InvalidAccessError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:104:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:100:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:99:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-GCM length: 256 using empty derivedKey, empty salt, SHA-1, with empty info with wrong (ECDH) key",0,null,null],["Derived key of type name: AES-KW length: 128 using empty derivedKey, empty salt, SHA-1, with empty info",1,"assert_unreached: deriveKey failed with error TypeError: Argument 2 of SubtleCrypto.deriveKey is not an object. Reached unreachable code","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:79:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:69:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:68:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-KW length: 128 using empty derivedKey, empty salt, SHA-1, with empty info with bad hash name SHA1",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"NotSupportedError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-KW length: 128 using empty derivedKey, empty salt, SHA-1, with empty info with missing deriveKey usage",1,"assert_equals: deriveKey with missing deriveKey usage correctly threw InvalidAccessError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"InvalidAccessError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:104:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:100:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:99:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-KW length: 128 using empty derivedKey, empty salt, SHA-1, with empty info with wrong (ECDH) key",0,null,null],["Derived key of type name: AES-KW length: 192 using empty derivedKey, empty salt, SHA-1, with empty info",1,"assert_unreached: deriveKey failed with error TypeError: Argument 2 of SubtleCrypto.deriveKey is not an object. Reached unreachable code","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:79:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:69:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:68:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-KW length: 192 using empty derivedKey, empty salt, SHA-1, with empty info with bad hash name SHA1",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"NotSupportedError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-KW length: 192 using empty derivedKey, empty salt, SHA-1, with empty info with missing deriveKey usage",1,"assert_equals: deriveKey with missing deriveKey usage correctly threw InvalidAccessError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"InvalidAccessError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:104:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:100:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:99:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-KW length: 192 using empty derivedKey, empty salt, SHA-1, with empty info with wrong (ECDH) key",0,null,null],["Derived key of type name: AES-KW length: 256 using empty derivedKey, empty salt, SHA-1, with empty info",1,"assert_unreached: deriveKey failed with error TypeError: Argument 2 of SubtleCrypto.deriveKey is not an object. Reached unreachable code","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:79:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:69:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:68:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-KW length: 256 using empty derivedKey, empty salt, SHA-1, with empty info with bad hash name SHA1",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"NotSupportedError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-KW length: 256 using empty derivedKey, empty salt, SHA-1, with empty info with missing deriveKey usage",1,"assert_equals: deriveKey with missing deriveKey usage correctly threw InvalidAccessError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"InvalidAccessError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:104:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:100:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:99:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-KW length: 256 using empty derivedKey, empty salt, SHA-1, with empty info with wrong (ECDH) key",0,null,null],["Derived key of type name: HMAC hash: SHA-1 length: 256 using empty derivedKey, empty salt, SHA-1, with empty info",1,"assert_unreached: deriveKey failed with error TypeError: Argument 2 of SubtleCrypto.deriveKey is not an object. Reached unreachable code","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:79:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:69:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:68:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: HMAC hash: SHA-1 length: 256 using empty derivedKey, empty salt, SHA-1, with empty info with bad hash name SHA1",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"NotSupportedError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: HMAC hash: SHA-1 length: 256 using empty derivedKey, empty salt, SHA-1, with empty info with missing deriveKey usage",1,"assert_equals: deriveKey with missing deriveKey usage correctly threw InvalidAccessError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"InvalidAccessError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:104:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:100:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:99:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: HMAC hash: SHA-1 length: 256 using empty derivedKey, empty salt, SHA-1, with empty info with wrong (ECDH) key",0,null,null],["Derived key of type name: HMAC hash: SHA-256 length: 256 using empty derivedKey, empty salt, SHA-1, with empty info",1,"assert_unreached: deriveKey failed with error TypeError: Argument 2 of SubtleCrypto.deriveKey is not an object. Reached unreachable code","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:79:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:69:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:68:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: HMAC hash: SHA-256 length: 256 using empty derivedKey, empty salt, SHA-1, with empty info with bad hash name SHA1",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"NotSupportedError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: HMAC hash: SHA-256 length: 256 using empty derivedKey, empty salt, SHA-1, with empty info with missing deriveKey usage",1,"assert_equals: deriveKey with missing deriveKey usage correctly threw InvalidAccessError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"InvalidAccessError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:104:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:100:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:99:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: HMAC hash: SHA-256 length: 256 using empty derivedKey, empty salt, SHA-1, with empty info with wrong (ECDH) key",0,null,null],["Derived key of type name: HMAC hash: SHA-384 length: 256 using empty derivedKey, empty salt, SHA-1, with empty info",1,"assert_unreached: deriveKey failed with error TypeError: Argument 2 of SubtleCrypto.deriveKey is not an object. Reached unreachable code","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:79:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:69:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:68:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: HMAC hash: SHA-384 length: 256 using empty derivedKey, empty salt, SHA-1, with empty info with bad hash name SHA1",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"NotSupportedError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: HMAC hash: SHA-384 length: 256 using empty derivedKey, empty salt, SHA-1, with empty info with missing deriveKey usage",1,"assert_equals: deriveKey with missing deriveKey usage correctly threw InvalidAccessError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"InvalidAccessError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:104:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:100:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:99:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: HMAC hash: SHA-384 length: 256 using empty derivedKey, empty salt, SHA-1, with empty info with wrong (ECDH) key",0,null,null],["Derived key of type name: HMAC hash: SHA-512 length: 256 using empty derivedKey, empty salt, SHA-1, with empty info",1,"assert_unreached: deriveKey failed with error TypeError: Argument 2 of SubtleCrypto.deriveKey is not an object. Reached unreachable code","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:79:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:69:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:68:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: HMAC hash: SHA-512 length: 256 using empty derivedKey, empty salt, SHA-1, with empty info with bad hash name SHA1",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"NotSupportedError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: HMAC hash: SHA-512 length: 256 using empty derivedKey, empty salt, SHA-1, with empty info with missing deriveKey usage",1,"assert_equals: deriveKey with missing deriveKey usage correctly threw InvalidAccessError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"InvalidAccessError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:104:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:100:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:99:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: HMAC hash: SHA-512 length: 256 using empty derivedKey, empty salt, SHA-1, with empty info with wrong (ECDH) key",0,null,null],["empty derivedKey, empty salt, SHA-1, with empty info with missing salt",0,null,null],["empty derivedKey, empty salt, SHA-1, with empty info with missing info",0,null,null],["empty derivedKey, empty salt, SHA-1, with empty info with null length",0,null,null],["empty derivedKey, empty salt, SHA-1, with empty info with non-multiple of 8 length",1,"assert_equals: deriveBits with non-multiple of 8 length correctly threw OperationError: Argument 2 of SubtleCrypto.deriveBits is not an object. expected \"OperationError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:158:33\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:154:36\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:153:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["empty derivedKey, empty salt, SHA-1, with empty info with bad hash name SHA1",1,"assert_equals: deriveBits with bad hash name correctly threw NotSupportedError: Argument 2 of SubtleCrypto.deriveBits is not an object. expected \"NotSupportedError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:170:33\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:166:36\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:164:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["empty derivedKey, empty salt, SHA-1, with empty info with missing deriveBits usage",1,"assert_equals: deriveBits with missing deriveBits usage correctly threw InvalidAccessError: Argument 2 of SubtleCrypto.deriveBits is not an object. expected \"InvalidAccessError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:180:33\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:176:36\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:175:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["empty derivedKey, empty salt, SHA-1, with empty info with wrong (ECDH) key",0,null,null],["empty derivedKey, empty salt, SHA-256, with normal info",1,"assert_unreached: deriveBits failed with error TypeError: Argument 2 of SubtleCrypto.deriveBits is not an object. Reached unreachable code","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:44:33\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:40:36\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:39:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["empty derivedKey, empty salt, SHA-256, with normal info with 0 length",1,"assert_equals: deriveBits with 0 length correctly threw OperationError: Argument 2 of SubtleCrypto.deriveBits is not an object. expected \"OperationError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:54:33\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:50:36\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:49:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-CBC length: 128 using empty derivedKey, empty salt, SHA-256, with normal info",1,"assert_unreached: deriveKey failed with error TypeError: Argument 2 of SubtleCrypto.deriveKey is not an object. Reached unreachable code","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:79:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:69:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:68:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-CBC length: 128 using empty derivedKey, empty salt, SHA-256, with normal info with bad hash name SHA256",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"NotSupportedError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-CBC length: 128 using empty derivedKey, empty salt, SHA-256, with normal info with missing deriveKey usage",1,"assert_equals: deriveKey with missing deriveKey usage correctly threw InvalidAccessError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"InvalidAccessError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:104:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:100:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:99:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-CBC length: 128 using empty derivedKey, empty salt, SHA-256, with normal info with wrong (ECDH) key",0,null,null],["Derived key of type name: AES-CBC length: 192 using empty derivedKey, empty salt, SHA-256, with normal info",1,"assert_unreached: deriveKey failed with error TypeError: Argument 2 of SubtleCrypto.deriveKey is not an object. Reached unreachable code","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:79:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:69:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:68:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-CBC length: 192 using empty derivedKey, empty salt, SHA-256, with normal info with bad hash name SHA256",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"NotSupportedError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-CBC length: 192 using empty derivedKey, empty salt, SHA-256, with normal info with missing deriveKey usage",1,"assert_equals: deriveKey with missing deriveKey usage correctly threw InvalidAccessError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"InvalidAccessError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:104:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:100:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:99:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-CBC length: 192 using empty derivedKey, empty salt, SHA-256, with normal info with wrong (ECDH) key",0,null,null],["Derived key of type name: AES-CBC length: 256 using empty derivedKey, empty salt, SHA-256, with normal info",1,"assert_unreached: deriveKey failed with error TypeError: Argument 2 of SubtleCrypto.deriveKey is not an object. Reached unreachable code","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:79:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:69:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:68:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-CBC length: 256 using empty derivedKey, empty salt, SHA-256, with normal info with bad hash name SHA256",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"NotSupportedError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-CBC length: 256 using empty derivedKey, empty salt, SHA-256, with normal info with missing deriveKey usage",1,"assert_equals: deriveKey with missing deriveKey usage correctly threw InvalidAccessError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"InvalidAccessError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:104:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:100:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:99:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-CBC length: 256 using empty derivedKey, empty salt, SHA-256, with normal info with wrong (ECDH) key",0,null,null],["Derived key of type name: AES-CTR length: 128 using empty derivedKey, empty salt, SHA-256, with normal info",1,"assert_unreached: deriveKey failed with error TypeError: Argument 2 of SubtleCrypto.deriveKey is not an object. Reached unreachable code","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:79:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:69:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:68:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-CTR length: 128 using empty derivedKey, empty salt, SHA-256, with normal info with bad hash name SHA256",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"NotSupportedError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-CTR length: 128 using empty derivedKey, empty salt, SHA-256, with normal info with missing deriveKey usage",1,"assert_equals: deriveKey with missing deriveKey usage correctly threw InvalidAccessError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"InvalidAccessError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:104:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:100:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:99:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-CTR length: 128 using empty derivedKey, empty salt, SHA-256, with normal info with wrong (ECDH) key",0,null,null],["Derived key of type name: AES-CTR length: 192 using empty derivedKey, empty salt, SHA-256, with normal info",1,"assert_unreached: deriveKey failed with error TypeError: Argument 2 of SubtleCrypto.deriveKey is not an object. Reached unreachable code","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:79:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:69:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:68:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-CTR length: 192 using empty derivedKey, empty salt, SHA-256, with normal info with bad hash name SHA256",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"NotSupportedError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-CTR length: 192 using empty derivedKey, empty salt, SHA-256, with normal info with missing deriveKey usage",1,"assert_equals: deriveKey with missing deriveKey usage correctly threw InvalidAccessError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"InvalidAccessError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:104:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:100:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:99:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-CTR length: 192 using empty derivedKey, empty salt, SHA-256, with normal info with wrong (ECDH) key",0,null,null],["Derived key of type name: AES-CTR length: 256 using empty derivedKey, empty salt, SHA-256, with normal info",1,"assert_unreached: deriveKey failed with error TypeError: Argument 2 of SubtleCrypto.deriveKey is not an object. Reached unreachable code","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:79:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:69:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:68:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-CTR length: 256 using empty derivedKey, empty salt, SHA-256, with normal info with bad hash name SHA256",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"NotSupportedError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-CTR length: 256 using empty derivedKey, empty salt, SHA-256, with normal info with missing deriveKey usage",1,"assert_equals: deriveKey with missing deriveKey usage correctly threw InvalidAccessError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"InvalidAccessError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:104:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:100:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:99:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-CTR length: 256 using empty derivedKey, empty salt, SHA-256, with normal info with wrong (ECDH) key",0,null,null],["Derived key of type name: AES-GCM length: 128 using empty derivedKey, empty salt, SHA-256, with normal info",1,"assert_unreached: deriveKey failed with error TypeError: Argument 2 of SubtleCrypto.deriveKey is not an object. Reached unreachable code","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:79:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:69:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:68:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-GCM length: 128 using empty derivedKey, empty salt, SHA-256, with normal info with bad hash name SHA256",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"NotSupportedError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-GCM length: 128 using empty derivedKey, empty salt, SHA-256, with normal info with missing deriveKey usage",1,"assert_equals: deriveKey with missing deriveKey usage correctly threw InvalidAccessError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"InvalidAccessError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:104:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:100:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:99:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-GCM length: 128 using empty derivedKey, empty salt, SHA-256, with normal info with wrong (ECDH) key",0,null,null],["Derived key of type name: AES-GCM length: 192 using empty derivedKey, empty salt, SHA-256, with normal info",1,"assert_unreached: deriveKey failed with error TypeError: Argument 2 of SubtleCrypto.deriveKey is not an object. Reached unreachable code","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:79:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:69:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:68:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-GCM length: 192 using empty derivedKey, empty salt, SHA-256, with normal info with bad hash name SHA256",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"NotSupportedError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-GCM length: 192 using empty derivedKey, empty salt, SHA-256, with normal info with missing deriveKey usage",1,"assert_equals: deriveKey with missing deriveKey usage correctly threw InvalidAccessError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"InvalidAccessError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:104:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:100:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:99:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-GCM length: 192 using empty derivedKey, empty salt, SHA-256, with normal info with wrong (ECDH) key",0,null,null],["Derived key of type name: AES-GCM length: 256 using empty derivedKey, empty salt, SHA-256, with normal info",1,"assert_unreached: deriveKey failed with error TypeError: Argument 2 of SubtleCrypto.deriveKey is not an object. Reached unreachable code","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:79:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:69:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:68:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-GCM length: 256 using empty derivedKey, empty salt, SHA-256, with normal info with bad hash name SHA256",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"NotSupportedError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-GCM length: 256 using empty derivedKey, empty salt, SHA-256, with normal info with missing deriveKey usage",1,"assert_equals: deriveKey with missing deriveKey usage correctly threw InvalidAccessError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"InvalidAccessError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:104:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:100:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:99:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-GCM length: 256 using empty derivedKey, empty salt, SHA-256, with normal info with wrong (ECDH) key",0,null,null],["Derived key of type name: AES-KW length: 128 using empty derivedKey, empty salt, SHA-256, with normal info",1,"assert_unreached: deriveKey failed with error TypeError: Argument 2 of SubtleCrypto.deriveKey is not an object. Reached unreachable code","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:79:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:69:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:68:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-KW length: 128 using empty derivedKey, empty salt, SHA-256, with normal info with bad hash name SHA256",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"NotSupportedError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-KW length: 128 using empty derivedKey, empty salt, SHA-256, with normal info with missing deriveKey usage",1,"assert_equals: deriveKey with missing deriveKey usage correctly threw InvalidAccessError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"InvalidAccessError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:104:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:100:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:99:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-KW length: 128 using empty derivedKey, empty salt, SHA-256, with normal info with wrong (ECDH) key",0,null,null],["Derived key of type name: AES-KW length: 192 using empty derivedKey, empty salt, SHA-256, with normal info",1,"assert_unreached: deriveKey failed with error TypeError: Argument 2 of SubtleCrypto.deriveKey is not an object. Reached unreachable code","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:79:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:69:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:68:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-KW length: 192 using empty derivedKey, empty salt, SHA-256, with normal info with bad hash name SHA256",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"NotSupportedError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-KW length: 192 using empty derivedKey, empty salt, SHA-256, with normal info with missing deriveKey usage",1,"assert_equals: deriveKey with missing deriveKey usage correctly threw InvalidAccessError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"InvalidAccessError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:104:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:100:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:99:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-KW length: 192 using empty derivedKey, empty salt, SHA-256, with normal info with wrong (ECDH) key",0,null,null],["Derived key of type name: AES-KW length: 256 using empty derivedKey, empty salt, SHA-256, with normal info",1,"assert_unreached: deriveKey failed with error TypeError: Argument 2 of SubtleCrypto.deriveKey is not an object. Reached unreachable code","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:79:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:69:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:68:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-KW length: 256 using empty derivedKey, empty salt, SHA-256, with normal info with bad hash name SHA256",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"NotSupportedError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-KW length: 256 using empty derivedKey, empty salt, SHA-256, with normal info with missing deriveKey usage",1,"assert_equals: deriveKey with missing deriveKey usage correctly threw InvalidAccessError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"InvalidAccessError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:104:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:100:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:99:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-KW length: 256 using empty derivedKey, empty salt, SHA-256, with normal info with wrong (ECDH) key",0,null,null],["Derived key of type name: HMAC hash: SHA-1 length: 256 using empty derivedKey, empty salt, SHA-256, with normal info",1,"assert_unreached: deriveKey failed with error TypeError: Argument 2 of SubtleCrypto.deriveKey is not an object. Reached unreachable code","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:79:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:69:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:68:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: HMAC hash: SHA-1 length: 256 using empty derivedKey, empty salt, SHA-256, with normal info with bad hash name SHA256",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"NotSupportedError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: HMAC hash: SHA-1 length: 256 using empty derivedKey, empty salt, SHA-256, with normal info with missing deriveKey usage",1,"assert_equals: deriveKey with missing deriveKey usage correctly threw InvalidAccessError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"InvalidAccessError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:104:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:100:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:99:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: HMAC hash: SHA-1 length: 256 using empty derivedKey, empty salt, SHA-256, with normal info with wrong (ECDH) key",0,null,null],["Derived key of type name: HMAC hash: SHA-256 length: 256 using empty derivedKey, empty salt, SHA-256, with normal info",1,"assert_unreached: deriveKey failed with error TypeError: Argument 2 of SubtleCrypto.deriveKey is not an object. Reached unreachable code","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:79:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:69:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:68:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: HMAC hash: SHA-256 length: 256 using empty derivedKey, empty salt, SHA-256, with normal info with bad hash name SHA256",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"NotSupportedError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: HMAC hash: SHA-256 length: 256 using empty derivedKey, empty salt, SHA-256, with normal info with missing deriveKey usage",1,"assert_equals: deriveKey with missing deriveKey usage correctly threw InvalidAccessError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"InvalidAccessError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:104:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:100:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:99:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: HMAC hash: SHA-256 length: 256 using empty derivedKey, empty salt, SHA-256, with normal info with wrong (ECDH) key",0,null,null],["Derived key of type name: HMAC hash: SHA-384 length: 256 using empty derivedKey, empty salt, SHA-256, with normal info",1,"assert_unreached: deriveKey failed with error TypeError: Argument 2 of SubtleCrypto.deriveKey is not an object. Reached unreachable code","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:79:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:69:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:68:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: HMAC hash: SHA-384 length: 256 using empty derivedKey, empty salt, SHA-256, with normal info with bad hash name SHA256",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"NotSupportedError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: HMAC hash: SHA-384 length: 256 using empty derivedKey, empty salt, SHA-256, with normal info with missing deriveKey usage",1,"assert_equals: deriveKey with missing deriveKey usage correctly threw InvalidAccessError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"InvalidAccessError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:104:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:100:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:99:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: HMAC hash: SHA-384 length: 256 using empty derivedKey, empty salt, SHA-256, with normal info with wrong (ECDH) key",0,null,null],["Derived key of type name: HMAC hash: SHA-512 length: 256 using empty derivedKey, empty salt, SHA-256, with normal info",1,"assert_unreached: deriveKey failed with error TypeError: Argument 2 of SubtleCrypto.deriveKey is not an object. Reached unreachable code","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:79:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:69:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:68:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: HMAC hash: SHA-512 length: 256 using empty derivedKey, empty salt, SHA-256, with normal info with bad hash name SHA256",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"NotSupportedError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: HMAC hash: SHA-512 length: 256 using empty derivedKey, empty salt, SHA-256, with normal info with missing deriveKey usage",1,"assert_equals: deriveKey with missing deriveKey usage correctly threw InvalidAccessError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"InvalidAccessError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:104:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:100:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:99:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: HMAC hash: SHA-512 length: 256 using empty derivedKey, empty salt, SHA-256, with normal info with wrong (ECDH) key",0,null,null],["empty derivedKey, empty salt, SHA-256, with normal info with missing salt",0,null,null],["empty derivedKey, empty salt, SHA-256, with normal info with missing info",0,null,null],["empty derivedKey, empty salt, SHA-256, with normal info with null length",0,null,null],["empty derivedKey, empty salt, SHA-256, with normal info with non-multiple of 8 length",1,"assert_equals: deriveBits with non-multiple of 8 length correctly threw OperationError: Argument 2 of SubtleCrypto.deriveBits is not an object. expected \"OperationError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:158:33\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:154:36\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:153:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["empty derivedKey, empty salt, SHA-256, with normal info with bad hash name SHA256",1,"assert_equals: deriveBits with bad hash name correctly threw NotSupportedError: Argument 2 of SubtleCrypto.deriveBits is not an object. expected \"NotSupportedError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:170:33\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:166:36\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:164:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["empty derivedKey, empty salt, SHA-256, with normal info with missing deriveBits usage",1,"assert_equals: deriveBits with missing deriveBits usage correctly threw InvalidAccessError: Argument 2 of SubtleCrypto.deriveBits is not an object. expected \"InvalidAccessError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:180:33\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:176:36\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:175:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["empty derivedKey, empty salt, SHA-256, with normal info with wrong (ECDH) key",0,null,null],["empty derivedKey, empty salt, SHA-256, with empty info",1,"assert_unreached: deriveBits failed with error TypeError: Argument 2 of SubtleCrypto.deriveBits is not an object. Reached unreachable code","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:44:33\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:40:36\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:39:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["empty derivedKey, empty salt, SHA-256, with empty info with 0 length",1,"assert_equals: deriveBits with 0 length correctly threw OperationError: Argument 2 of SubtleCrypto.deriveBits is not an object. expected \"OperationError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:54:33\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:50:36\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:49:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-CBC length: 128 using empty derivedKey, empty salt, SHA-256, with empty info",1,"assert_unreached: deriveKey failed with error TypeError: Argument 2 of SubtleCrypto.deriveKey is not an object. Reached unreachable code","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:79:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:69:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:68:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-CBC length: 128 using empty derivedKey, empty salt, SHA-256, with empty info with bad hash name SHA256",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"NotSupportedError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-CBC length: 128 using empty derivedKey, empty salt, SHA-256, with empty info with missing deriveKey usage",1,"assert_equals: deriveKey with missing deriveKey usage correctly threw InvalidAccessError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"InvalidAccessError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:104:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:100:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:99:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-CBC length: 128 using empty derivedKey, empty salt, SHA-256, with empty info with wrong (ECDH) key",0,null,null],["Derived key of type name: AES-CBC length: 192 using empty derivedKey, empty salt, SHA-256, with empty info",1,"assert_unreached: deriveKey failed with error TypeError: Argument 2 of SubtleCrypto.deriveKey is not an object. Reached unreachable code","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:79:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:69:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:68:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-CBC length: 192 using empty derivedKey, empty salt, SHA-256, with empty info with bad hash name SHA256",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"NotSupportedError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-CBC length: 192 using empty derivedKey, empty salt, SHA-256, with empty info with missing deriveKey usage",1,"assert_equals: deriveKey with missing deriveKey usage correctly threw InvalidAccessError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"InvalidAccessError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:104:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:100:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:99:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-CBC length: 192 using empty derivedKey, empty salt, SHA-256, with empty info with wrong (ECDH) key",0,null,null],["Derived key of type name: AES-CBC length: 256 using empty derivedKey, empty salt, SHA-256, with empty info",1,"assert_unreached: deriveKey failed with error TypeError: Argument 2 of SubtleCrypto.deriveKey is not an object. Reached unreachable code","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:79:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:69:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:68:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-CBC length: 256 using empty derivedKey, empty salt, SHA-256, with empty info with bad hash name SHA256",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"NotSupportedError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-CBC length: 256 using empty derivedKey, empty salt, SHA-256, with empty info with missing deriveKey usage",1,"assert_equals: deriveKey with missing deriveKey usage correctly threw InvalidAccessError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"InvalidAccessError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:104:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:100:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:99:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-CBC length: 256 using empty derivedKey, empty salt, SHA-256, with empty info with wrong (ECDH) key",0,null,null],["Derived key of type name: AES-CTR length: 128 using empty derivedKey, empty salt, SHA-256, with empty info",1,"assert_unreached: deriveKey failed with error TypeError: Argument 2 of SubtleCrypto.deriveKey is not an object. Reached unreachable code","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:79:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:69:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:68:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-CTR length: 128 using empty derivedKey, empty salt, SHA-256, with empty info with bad hash name SHA256",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"NotSupportedError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-CTR length: 128 using empty derivedKey, empty salt, SHA-256, with empty info with missing deriveKey usage",1,"assert_equals: deriveKey with missing deriveKey usage correctly threw InvalidAccessError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"InvalidAccessError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:104:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:100:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:99:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-CTR length: 128 using empty derivedKey, empty salt, SHA-256, with empty info with wrong (ECDH) key",0,null,null],["Derived key of type name: AES-CTR length: 192 using empty derivedKey, empty salt, SHA-256, with empty info",1,"assert_unreached: deriveKey failed with error TypeError: Argument 2 of SubtleCrypto.deriveKey is not an object. Reached unreachable code","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:79:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:69:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:68:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-CTR length: 192 using empty derivedKey, empty salt, SHA-256, with empty info with bad hash name SHA256",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"NotSupportedError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-CTR length: 192 using empty derivedKey, empty salt, SHA-256, with empty info with missing deriveKey usage",1,"assert_equals: deriveKey with missing deriveKey usage correctly threw InvalidAccessError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"InvalidAccessError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:104:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:100:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:99:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-CTR length: 192 using empty derivedKey, empty salt, SHA-256, with empty info with wrong (ECDH) key",0,null,null],["Derived key of type name: AES-CTR length: 256 using empty derivedKey, empty salt, SHA-256, with empty info",1,"assert_unreached: deriveKey failed with error TypeError: Argument 2 of SubtleCrypto.deriveKey is not an object. Reached unreachable code","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:79:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:69:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:68:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-CTR length: 256 using empty derivedKey, empty salt, SHA-256, with empty info with bad hash name SHA256",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"NotSupportedError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-CTR length: 256 using empty derivedKey, empty salt, SHA-256, with empty info with missing deriveKey usage",1,"assert_equals: deriveKey with missing deriveKey usage correctly threw InvalidAccessError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"InvalidAccessError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:104:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:100:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:99:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-CTR length: 256 using empty derivedKey, empty salt, SHA-256, with empty info with wrong (ECDH) key",0,null,null],["Derived key of type name: AES-GCM length: 128 using empty derivedKey, empty salt, SHA-256, with empty info",1,"assert_unreached: deriveKey failed with error TypeError: Argument 2 of SubtleCrypto.deriveKey is not an object. Reached unreachable code","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:79:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:69:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:68:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-GCM length: 128 using empty derivedKey, empty salt, SHA-256, with empty info with bad hash name SHA256",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"NotSupportedError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-GCM length: 128 using empty derivedKey, empty salt, SHA-256, with empty info with missing deriveKey usage",1,"assert_equals: deriveKey with missing deriveKey usage correctly threw InvalidAccessError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"InvalidAccessError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:104:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:100:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:99:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-GCM length: 128 using empty derivedKey, empty salt, SHA-256, with empty info with wrong (ECDH) key",0,null,null],["Derived key of type name: AES-GCM length: 192 using empty derivedKey, empty salt, SHA-256, with empty info",1,"assert_unreached: deriveKey failed with error TypeError: Argument 2 of SubtleCrypto.deriveKey is not an object. Reached unreachable code","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:79:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:69:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:68:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-GCM length: 192 using empty derivedKey, empty salt, SHA-256, with empty info with bad hash name SHA256",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"NotSupportedError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-GCM length: 192 using empty derivedKey, empty salt, SHA-256, with empty info with missing deriveKey usage",1,"assert_equals: deriveKey with missing deriveKey usage correctly threw InvalidAccessError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"InvalidAccessError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:104:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:100:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:99:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-GCM length: 192 using empty derivedKey, empty salt, SHA-256, with empty info with wrong (ECDH) key",0,null,null],["Derived key of type name: AES-GCM length: 256 using empty derivedKey, empty salt, SHA-256, with empty info",1,"assert_unreached: deriveKey failed with error TypeError: Argument 2 of SubtleCrypto.deriveKey is not an object. Reached unreachable code","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:79:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:69:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:68:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-GCM length: 256 using empty derivedKey, empty salt, SHA-256, with empty info with bad hash name SHA256",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"NotSupportedError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-GCM length: 256 using empty derivedKey, empty salt, SHA-256, with empty info with missing deriveKey usage",1,"assert_equals: deriveKey with missing deriveKey usage correctly threw InvalidAccessError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"InvalidAccessError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:104:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:100:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:99:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-GCM length: 256 using empty derivedKey, empty salt, SHA-256, with empty info with wrong (ECDH) key",0,null,null],["Derived key of type name: AES-KW length: 128 using empty derivedKey, empty salt, SHA-256, with empty info",1,"assert_unreached: deriveKey failed with error TypeError: Argument 2 of SubtleCrypto.deriveKey is not an object. Reached unreachable code","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:79:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:69:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:68:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-KW length: 128 using empty derivedKey, empty salt, SHA-256, with empty info with bad hash name SHA256",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"NotSupportedError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-KW length: 128 using empty derivedKey, empty salt, SHA-256, with empty info with missing deriveKey usage",1,"assert_equals: deriveKey with missing deriveKey usage correctly threw InvalidAccessError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"InvalidAccessError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:104:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:100:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:99:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-KW length: 128 using empty derivedKey, empty salt, SHA-256, with empty info with wrong (ECDH) key",0,null,null],["Derived key of type name: AES-KW length: 192 using empty derivedKey, empty salt, SHA-256, with empty info",1,"assert_unreached: deriveKey failed with error TypeError: Argument 2 of SubtleCrypto.deriveKey is not an object. Reached unreachable code","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:79:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:69:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:68:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-KW length: 192 using empty derivedKey, empty salt, SHA-256, with empty info with bad hash name SHA256",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"NotSupportedError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-KW length: 192 using empty derivedKey, empty salt, SHA-256, with empty info with missing deriveKey usage",1,"assert_equals: deriveKey with missing deriveKey usage correctly threw InvalidAccessError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"InvalidAccessError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:104:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:100:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:99:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-KW length: 192 using empty derivedKey, empty salt, SHA-256, with empty info with wrong (ECDH) key",0,null,null],["Derived key of type name: AES-KW length: 256 using empty derivedKey, empty salt, SHA-256, with empty info",1,"assert_unreached: deriveKey failed with error TypeError: Argument 2 of SubtleCrypto.deriveKey is not an object. Reached unreachable code","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:79:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:69:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:68:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-KW length: 256 using empty derivedKey, empty salt, SHA-256, with empty info with bad hash name SHA256",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"NotSupportedError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-KW length: 256 using empty derivedKey, empty salt, SHA-256, with empty info with missing deriveKey usage",1,"assert_equals: deriveKey with missing deriveKey usage correctly threw InvalidAccessError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"InvalidAccessError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:104:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:100:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:99:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-KW length: 256 using empty derivedKey, empty salt, SHA-256, with empty info with wrong (ECDH) key",0,null,null],["Derived key of type name: HMAC hash: SHA-1 length: 256 using empty derivedKey, empty salt, SHA-256, with empty info",1,"assert_unreached: deriveKey failed with error TypeError: Argument 2 of SubtleCrypto.deriveKey is not an object. Reached unreachable code","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:79:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:69:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:68:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: HMAC hash: SHA-1 length: 256 using empty derivedKey, empty salt, SHA-256, with empty info with bad hash name SHA256",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"NotSupportedError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: HMAC hash: SHA-1 length: 256 using empty derivedKey, empty salt, SHA-256, with empty info with missing deriveKey usage",1,"assert_equals: deriveKey with missing deriveKey usage correctly threw InvalidAccessError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"InvalidAccessError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:104:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:100:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:99:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: HMAC hash: SHA-1 length: 256 using empty derivedKey, empty salt, SHA-256, with empty info with wrong (ECDH) key",0,null,null],["Derived key of type name: HMAC hash: SHA-256 length: 256 using empty derivedKey, empty salt, SHA-256, with empty info",1,"assert_unreached: deriveKey failed with error TypeError: Argument 2 of SubtleCrypto.deriveKey is not an object. Reached unreachable code","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:79:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:69:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:68:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: HMAC hash: SHA-256 length: 256 using empty derivedKey, empty salt, SHA-256, with empty info with bad hash name SHA256",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"NotSupportedError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: HMAC hash: SHA-256 length: 256 using empty derivedKey, empty salt, SHA-256, with empty info with missing deriveKey usage",1,"assert_equals: deriveKey with missing deriveKey usage correctly threw InvalidAccessError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"InvalidAccessError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:104:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:100:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:99:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: HMAC hash: SHA-256 length: 256 using empty derivedKey, empty salt, SHA-256, with empty info with wrong (ECDH) key",0,null,null],["Derived key of type name: HMAC hash: SHA-384 length: 256 using empty derivedKey, empty salt, SHA-256, with empty info",1,"assert_unreached: deriveKey failed with error TypeError: Argument 2 of SubtleCrypto.deriveKey is not an object. Reached unreachable code","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:79:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:69:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:68:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: HMAC hash: SHA-384 length: 256 using empty derivedKey, empty salt, SHA-256, with empty info with bad hash name SHA256",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"NotSupportedError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: HMAC hash: SHA-384 length: 256 using empty derivedKey, empty salt, SHA-256, with empty info with missing deriveKey usage",1,"assert_equals: deriveKey with missing deriveKey usage correctly threw InvalidAccessError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"InvalidAccessError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:104:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:100:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:99:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: HMAC hash: SHA-384 length: 256 using empty derivedKey, empty salt, SHA-256, with empty info with wrong (ECDH) key",0,null,null],["Derived key of type name: HMAC hash: SHA-512 length: 256 using empty derivedKey, empty salt, SHA-256, with empty info",1,"assert_unreached: deriveKey failed with error TypeError: Argument 2 of SubtleCrypto.deriveKey is not an object. Reached unreachable code","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:79:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:69:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:68:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: HMAC hash: SHA-512 length: 256 using empty derivedKey, empty salt, SHA-256, with empty info with bad hash name SHA256",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"NotSupportedError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: HMAC hash: SHA-512 length: 256 using empty derivedKey, empty salt, SHA-256, with empty info with missing deriveKey usage",1,"assert_equals: deriveKey with missing deriveKey usage correctly threw InvalidAccessError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"InvalidAccessError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:104:37\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:100:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:99:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: HMAC hash: SHA-512 length: 256 using empty derivedKey, empty salt, SHA-256, with empty info with wrong (ECDH) key",0,null,null],["empty derivedKey, empty salt, SHA-256, with empty info with missing salt",0,null,null],["empty derivedKey, empty salt, SHA-256, with empty info with missing info",0,null,null],["empty derivedKey, empty salt, SHA-256, with empty info with null length",0,null,null],["empty derivedKey, empty salt, SHA-256, with empty info with non-multiple of 8 length",1,"assert_equals: deriveBits with non-multiple of 8 length correctly threw OperationError: Argument 2 of SubtleCrypto.deriveBits is not an object. expected \"OperationError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:158:33\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:154:36\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:153:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["empty derivedKey, empty salt, SHA-256, with empty info with bad hash name SHA256",1,"assert_equals: deriveBits with bad hash name correctly threw NotSupportedError: Argument 2 of SubtleCrypto.deriveBits is not an object. expected \"NotSupportedError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:170:33\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:166:36\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:164:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["empty derivedKey, empty salt, SHA-256, with empty info with missing deriveBits usage",1,"assert_equals: deriveBits with missing deriveBits usage correctly threw InvalidAccessError: Argument 2 of SubtleCrypto.deriveBits is not an object. expected \"InvalidAccessError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:180:33\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:176:36\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:175:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["empty derivedKey, empty salt, SHA-256, with empty info with wrong (ECDH) key",0,null,null],["empty derivedKey, empty salt, PBKDF2, with normal info with non-digest algorithm PBKDF2",1,"assert_equals: deriveBits with non-digest algorithm correctly threw NotSupportedError: Argument 2 of SubtleCrypto.deriveBits is not an object. expected \"NotSupportedError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:210:29\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:206:32\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:205:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:198:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-CBC length: 128 using empty derivedKey, empty salt, PBKDF2, with normal info",1,"assert_equals: derivekey with non-digest algorithm correctly threw NotSupportedError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"NotSupportedError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:226:33\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:222:36\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:221:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:214:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:198:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-CBC length: 192 using empty derivedKey, empty salt, PBKDF2, with normal info",1,"assert_equals: derivekey with non-digest algorithm correctly threw NotSupportedError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"NotSupportedError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:226:33\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:222:36\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:221:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:214:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:198:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-CBC length: 256 using empty derivedKey, empty salt, PBKDF2, with normal info",1,"assert_equals: derivekey with non-digest algorithm correctly threw NotSupportedError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"NotSupportedError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:226:33\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:222:36\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:221:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:214:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:198:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-CTR length: 128 using empty derivedKey, empty salt, PBKDF2, with normal info",1,"assert_equals: derivekey with non-digest algorithm correctly threw NotSupportedError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"NotSupportedError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:226:33\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:222:36\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:221:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:214:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:198:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-CTR length: 192 using empty derivedKey, empty salt, PBKDF2, with normal info",1,"assert_equals: derivekey with non-digest algorithm correctly threw NotSupportedError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"NotSupportedError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:226:33\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:222:36\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:221:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:214:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:198:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-CTR length: 256 using empty derivedKey, empty salt, PBKDF2, with normal info",1,"assert_equals: derivekey with non-digest algorithm correctly threw NotSupportedError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"NotSupportedError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:226:33\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:222:36\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:221:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:214:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:198:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-GCM length: 128 using empty derivedKey, empty salt, PBKDF2, with normal info",1,"assert_equals: derivekey with non-digest algorithm correctly threw NotSupportedError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"NotSupportedError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:226:33\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:222:36\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:221:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:214:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:198:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-GCM length: 192 using empty derivedKey, empty salt, PBKDF2, with normal info",1,"assert_equals: derivekey with non-digest algorithm correctly threw NotSupportedError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"NotSupportedError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:226:33\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:222:36\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:221:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:214:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:198:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-GCM length: 256 using empty derivedKey, empty salt, PBKDF2, with normal info",1,"assert_equals: derivekey with non-digest algorithm correctly threw NotSupportedError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"NotSupportedError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:226:33\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:222:36\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:221:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:214:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:198:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-KW length: 128 using empty derivedKey, empty salt, PBKDF2, with normal info",1,"assert_equals: derivekey with non-digest algorithm correctly threw NotSupportedError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"NotSupportedError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:226:33\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:222:36\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:221:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:214:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:198:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-KW length: 192 using empty derivedKey, empty salt, PBKDF2, with normal info",1,"assert_equals: derivekey with non-digest algorithm correctly threw NotSupportedError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"NotSupportedError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:226:33\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:222:36\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:221:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:214:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:198:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-KW length: 256 using empty derivedKey, empty salt, PBKDF2, with normal info",1,"assert_equals: derivekey with non-digest algorithm correctly threw NotSupportedError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"NotSupportedError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:226:33\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:222:36\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:221:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:214:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:198:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: HMAC hash: SHA-1 length: 256 using empty derivedKey, empty salt, PBKDF2, with normal info",1,"assert_equals: derivekey with non-digest algorithm correctly threw NotSupportedError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"NotSupportedError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:226:33\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:222:36\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:221:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:214:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:198:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: HMAC hash: SHA-256 length: 256 using empty derivedKey, empty salt, PBKDF2, with normal info",1,"assert_equals: derivekey with non-digest algorithm correctly threw NotSupportedError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"NotSupportedError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:226:33\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:222:36\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:221:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:214:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:198:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: HMAC hash: SHA-384 length: 256 using empty derivedKey, empty salt, PBKDF2, with normal info",1,"assert_equals: derivekey with non-digest algorithm correctly threw NotSupportedError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"NotSupportedError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:226:33\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:222:36\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:221:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:214:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:198:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: HMAC hash: SHA-512 length: 256 using empty derivedKey, empty salt, PBKDF2, with normal info",1,"assert_equals: derivekey with non-digest algorithm correctly threw NotSupportedError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"NotSupportedError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:226:33\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:222:36\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:221:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:214:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:198:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["empty derivedKey, empty salt, PBKDF2, with empty info with non-digest algorithm PBKDF2",1,"assert_equals: deriveBits with non-digest algorithm correctly threw NotSupportedError: Argument 2 of SubtleCrypto.deriveBits is not an object. expected \"NotSupportedError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:210:29\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:206:32\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:205:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:198:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-CBC length: 128 using empty derivedKey, empty salt, PBKDF2, with empty info",1,"assert_equals: derivekey with non-digest algorithm correctly threw NotSupportedError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"NotSupportedError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:226:33\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:222:36\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:221:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:214:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:198:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-CBC length: 192 using empty derivedKey, empty salt, PBKDF2, with empty info",1,"assert_equals: derivekey with non-digest algorithm correctly threw NotSupportedError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"NotSupportedError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:226:33\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:222:36\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:221:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:214:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:198:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-CBC length: 256 using empty derivedKey, empty salt, PBKDF2, with empty info",1,"assert_equals: derivekey with non-digest algorithm correctly threw NotSupportedError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"NotSupportedError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:226:33\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:222:36\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:221:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:214:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:198:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-CTR length: 128 using empty derivedKey, empty salt, PBKDF2, with empty info",1,"assert_equals: derivekey with non-digest algorithm correctly threw NotSupportedError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"NotSupportedError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:226:33\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:222:36\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:221:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:214:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:198:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-CTR length: 192 using empty derivedKey, empty salt, PBKDF2, with empty info",1,"assert_equals: derivekey with non-digest algorithm correctly threw NotSupportedError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"NotSupportedError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:226:33\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:222:36\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:221:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:214:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:198:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-CTR length: 256 using empty derivedKey, empty salt, PBKDF2, with empty info",1,"assert_equals: derivekey with non-digest algorithm correctly threw NotSupportedError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"NotSupportedError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:226:33\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:222:36\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:221:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:214:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:198:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-GCM length: 128 using empty derivedKey, empty salt, PBKDF2, with empty info",1,"assert_equals: derivekey with non-digest algorithm correctly threw NotSupportedError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"NotSupportedError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:226:33\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:222:36\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:221:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:214:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:198:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-GCM length: 192 using empty derivedKey, empty salt, PBKDF2, with empty info",1,"assert_equals: derivekey with non-digest algorithm correctly threw NotSupportedError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"NotSupportedError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:226:33\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:222:36\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:221:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:214:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:198:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-GCM length: 256 using empty derivedKey, empty salt, PBKDF2, with empty info",1,"assert_equals: derivekey with non-digest algorithm correctly threw NotSupportedError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"NotSupportedError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:226:33\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:222:36\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:221:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:214:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:198:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-KW length: 128 using empty derivedKey, empty salt, PBKDF2, with empty info",1,"assert_equals: derivekey with non-digest algorithm correctly threw NotSupportedError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"NotSupportedError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:226:33\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:222:36\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:221:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:214:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:198:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-KW length: 192 using empty derivedKey, empty salt, PBKDF2, with empty info",1,"assert_equals: derivekey with non-digest algorithm correctly threw NotSupportedError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"NotSupportedError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:226:33\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:222:36\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:221:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:214:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:198:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-KW length: 256 using empty derivedKey, empty salt, PBKDF2, with empty info",1,"assert_equals: derivekey with non-digest algorithm correctly threw NotSupportedError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"NotSupportedError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:226:33\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:222:36\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:221:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:214:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:198:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: HMAC hash: SHA-1 length: 256 using empty derivedKey, empty salt, PBKDF2, with empty info",1,"assert_equals: derivekey with non-digest algorithm correctly threw NotSupportedError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"NotSupportedError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:226:33\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:222:36\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:221:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:214:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:198:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: HMAC hash: SHA-256 length: 256 using empty derivedKey, empty salt, PBKDF2, with empty info",1,"assert_equals: derivekey with non-digest algorithm correctly threw NotSupportedError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"NotSupportedError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:226:33\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:222:36\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:221:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:214:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:198:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: HMAC hash: SHA-384 length: 256 using empty derivedKey, empty salt, PBKDF2, with empty info",1,"assert_equals: derivekey with non-digest algorithm correctly threw NotSupportedError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"NotSupportedError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:226:33\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:222:36\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:221:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:214:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:198:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: HMAC hash: SHA-512 length: 256 using empty derivedKey, empty salt, PBKDF2, with empty info",1,"assert_equals: derivekey with non-digest algorithm correctly threw NotSupportedError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"NotSupportedError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:226:33\nAsync*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:222:36\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nAsync*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:221:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:214:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:198:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\nAsync*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"]]]}]
23:34:53 INFO - ........................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
23:34:53 INFO - PROCESS | 4084 | --DOCSHELL 0000007605615800 == 9 [pid = 4084] [id = 11]
23:34:53 INFO - ....................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
23:34:53 INFO - TEST-OK | /WebCryptoAPI/derive_bits_keys/test_hkdf.html | took 13897ms
23:34:53 INFO - PROCESS | 4084 | 1477636493385 Marionette TRACE conn7 -> [0,43,"getWindowHandle",null]
23:34:53 INFO - PROCESS | 4084 | 1477636493390 Marionette TRACE conn7 <- [1,43,null,{"value":"13"}]
23:34:53 INFO - TEST-START | /XMLHttpRequest/FormData-append.html
23:34:53 INFO - PROCESS | 4084 | 1477636493399 Marionette TRACE conn7 -> [0,44,"timeouts",{"script":35000}]
23:34:53 INFO - PROCESS | 4084 | 1477636493406 Marionette TRACE conn7 <- [1,44,null,{}]
23:34:53 INFO - PROCESS | 4084 | 1477636493415 Marionette TRACE conn7 -> [0,45,"executeScript",{"scriptTimeout":null,"newSandbox":true,"args":[],"filename":"executormarionette.py","script":"if (window.wrappedJSObject.win) {window.wrappedJSObject.win.close()}","sandbox":"default","line":430}]
23:34:53 INFO - PROCESS | 4084 | 1477636493534 Marionette TRACE conn7 <- [1,45,null,{"value":null}]
23:34:53 INFO - PROCESS | 4084 | --DOCSHELL 000000760397D000 == 8 [pid = 4084] [id = 16]
23:34:53 INFO - PROCESS | 4084 | 1477636493584 Marionette TRACE conn7 -> [0,46,"getWindowHandles",null]
23:34:53 INFO - PROCESS | 4084 | 1477636493593 Marionette TRACE conn7 <- [1,46,null,["13"]]
23:34:53 INFO - PROCESS | 4084 | 1477636493598 Marionette TRACE conn7 -> [0,47,"switchToWindow",{"name":"13"}]
23:34:53 INFO - PROCESS | 4084 | 1477636493604 Marionette TRACE conn7 <- [1,47,null,{}]
23:34:53 INFO - PROCESS | 4084 | 1477636493612 Marionette TRACE conn7 -> [0,48,"executeAsyncScript",{"scriptTimeout":null,"sandbox":"default","debug_script":false,"script":"/* This Source Code Form is subject to the terms of the Mozilla Public\n * License, v. 2.0. If a copy of the MPL was not distributed with this\n * file, You can obtain one at http://mozilla.org/MPL/2.0/. */\n\nwindow.wrappedJSObject.timeout_multiplier = 3;\nwindow.wrappedJSObject.explicit_timeout = 0;\n\nwindow.wrappedJSObject.addEventListener(\"message\", function listener(event) {\n if (event.data.type != \"complete\") {\n return;\n }\n window.wrappedJSObject.removeEventListener(\"message\", listener);\n clearTimeout(timer);\n var tests = event.data.tests;\n var status = event.data.status;\n\n var subtest_results = tests.map(function(x) {\n return [x.name, x.status, x.message, x.stack]\n });\n\n marionetteScriptFinished([\"/XMLHttpRequest/FormData-append.html\",\n status.status,\n status.message,\n status.stack,\n subtest_results]);\n}, false);\n\nwindow.wrappedJSObject.win = window.open(\"http://web-platform.test:8000/XMLHttpRequest/FormData-append.html\", \"9263aebf-3e6f-41f6-9f2e-cdafea6cd8db\");\n\nvar timer = null;\nif (30000) {\n timer = setTimeout(function() {\n log(\"Timeout fired\");\n window.wrappedJSObject.win.timeout();\n }, 30000);\n}\n","newSandbox":false,"line":445,"args":[],"filename":"executormarionette.py"}]
23:34:53 INFO - PROCESS | 4084 | ++DOCSHELL 0000007603A59800 == 9 [pid = 4084] [id = 18]
23:34:53 INFO - PROCESS | 4084 | ++DOMWINDOW == 23 (0000007603A5A000) [pid = 4084] [serial = 54] [outer = 0000000000000000]
23:34:53 INFO - PROCESS | 4084 | ++DOMWINDOW == 24 (0000007603A64000) [pid = 4084] [serial = 55] [outer = 0000007603A5A000]
23:34:53 INFO - PROCESS | 4084 | 1477636493680 Marionette DEBUG loaded listener.js
23:34:53 INFO - PROCESS | 4084 | ++DOMWINDOW == 25 (0000007604CD7800) [pid = 4084] [serial = 56] [outer = 0000007603A5A000]
23:34:54 INFO - PROCESS | 4084 | 1477636494058 Marionette TRACE conn7 <- [1,48,null,{"value":["/XMLHttpRequest/FormData-append.html",0,null,null,[["Passing a String object to FormData.append should work.",0,null,null],["testFormDataAppend1",0,null,null],["testFormDataAppend2",0,null,null],["testFormDataAppendUndefined1",0,null,null],["testFormDataAppendUndefined2",0,null,null],["testFormDataAppendNull1",0,null,null],["testFormDataAppendNull2",0,null,null],["testFormDataAppendToForm1",0,null,null],["testFormDataAppendToForm2",0,null,null],["testFormDataAppendToFormUndefined1",0,null,null],["testFormDataAppendToFormUndefined2",0,null,null],["testFormDataAppendToFormNull1",0,null,null],["testFormDataAppendToFormNull2",0,null,null],["testFormDataAppendEmptyBlob",0,null,null]]]}]
23:34:54 INFO - ..............
23:34:54 INFO - TEST-OK | /XMLHttpRequest/FormData-append.html | took 693ms
23:34:54 INFO - TEST-START | /XMLHttpRequest/XMLHttpRequest-withCredentials.any.html
23:34:54 INFO - PROCESS | 4084 | 1477636494092 Marionette TRACE conn7 -> [0,49,"getWindowHandle",null]
23:34:54 INFO - PROCESS | 4084 | 1477636494096 Marionette TRACE conn7 <- [1,49,null,{"value":"13"}]
23:34:54 INFO - PROCESS | 4084 | 1477636494101 Marionette TRACE conn7 -> [0,50,"executeScript",{"scriptTimeout":null,"newSandbox":true,"args":[],"filename":"executormarionette.py","script":"if (window.wrappedJSObject.win) {window.wrappedJSObject.win.close()}","sandbox":"default","line":430}]
23:34:54 INFO - PROCESS | 4084 | 1477636494209 Marionette TRACE conn7 <- [1,50,null,{"value":null}]
23:34:54 INFO - PROCESS | 4084 | 1477636494216 Marionette TRACE conn7 -> [0,51,"getWindowHandles",null]
23:34:54 INFO - PROCESS | 4084 | 1477636494220 Marionette TRACE conn7 <- [1,51,null,["13"]]
23:34:54 INFO - PROCESS | 4084 | 1477636494224 Marionette TRACE conn7 -> [0,52,"switchToWindow",{"name":"13"}]
23:34:54 INFO - PROCESS | 4084 | 1477636494228 Marionette TRACE conn7 <- [1,52,null,{}]
23:34:54 INFO - PROCESS | 4084 | 1477636494241 Marionette TRACE conn7 -> [0,53,"executeAsyncScript",{"scriptTimeout":null,"sandbox":"default","debug_script":false,"script":"/* This Source Code Form is subject to the terms of the Mozilla Public\n * License, v. 2.0. If a copy of the MPL was not distributed with this\n * file, You can obtain one at http://mozilla.org/MPL/2.0/. */\n\nwindow.wrappedJSObject.timeout_multiplier = 3;\nwindow.wrappedJSObject.explicit_timeout = 0;\n\nwindow.wrappedJSObject.addEventListener(\"message\", function listener(event) {\n if (event.data.type != \"complete\") {\n return;\n }\n window.wrappedJSObject.removeEventListener(\"message\", listener);\n clearTimeout(timer);\n var tests = event.data.tests;\n var status = event.data.status;\n\n var subtest_results = tests.map(function(x) {\n return [x.name, x.status, x.message, x.stack]\n });\n\n marionetteScriptFinished([\"/XMLHttpRequest/XMLHttpRequest-withCredentials.any.html\",\n status.status,\n status.message,\n status.stack,\n subtest_results]);\n}, false);\n\nwindow.wrappedJSObject.win = window.open(\"http://web-platform.test:8000/XMLHttpRequest/XMLHttpRequest-withCredentials.any.html\", \"9263aebf-3e6f-41f6-9f2e-cdafea6cd8db\");\n\nvar timer = null;\nif (30000) {\n timer = setTimeout(function() {\n log(\"Timeout fired\");\n window.wrappedJSObject.win.timeout();\n }, 30000);\n}\n","newSandbox":false,"line":445,"args":[],"filename":"executormarionette.py"}]
23:34:54 INFO - PROCESS | 4084 | ++DOCSHELL 0000007605BBB000 == 10 [pid = 4084] [id = 19]
23:34:54 INFO - PROCESS | 4084 | ++DOMWINDOW == 26 (0000007605BBC000) [pid = 4084] [serial = 57] [outer = 0000000000000000]
23:34:54 INFO - PROCESS | 4084 | ++DOMWINDOW == 27 (0000007605BC3000) [pid = 4084] [serial = 58] [outer = 0000007605BBC000]
23:34:54 INFO - PROCESS | 4084 | 1477636494303 Marionette DEBUG loaded listener.js
23:34:54 INFO - PROCESS | 4084 | ++DOMWINDOW == 28 (0000007605C2E800) [pid = 4084] [serial = 59] [outer = 0000007605BBC000]
23:34:54 INFO - PROCESS | 4084 | [4084] WARNING: Failed to retarget HTML data delivery to the parser thread.: file c:/builds/moz2_slave/fx-team-w64-d-0000000000000000/build/src/parser/html/nsHtml5StreamParser.cpp, line 970
23:34:55 INFO - PROCESS | 4084 | --DOMWINDOW == 27 (000000760397D800) [pid = 4084] [serial = 47] [outer = 0000000000000000] [url = http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_ecdh_keys.html]
23:34:55 INFO - PROCESS | 4084 | 1477636495707 Marionette TRACE conn7 <- [1,53,null,{"value":["/XMLHttpRequest/XMLHttpRequest-withCredentials.any.html",0,null,null,[["default value is false, set value is true",0,null,null],["can also be set in OPEN state",0,null,null],["setting on synchronous XHR",0,null,null],["setting withCredentials when not in UNSENT, OPENED state (asynchronous)",0,null,null],["setting withCredentials when in DONE state (synchronous)",0,null,null]]]}]
23:34:55 INFO - .....
23:34:55 INFO - TEST-OK | /XMLHttpRequest/XMLHttpRequest-withCredentials.any.html | took 1634ms
23:34:55 INFO - PROCESS | 4084 | 1477636495735 Marionette TRACE conn7 -> [0,54,"getWindowHandle",null]
23:34:55 INFO - PROCESS | 4084 | 1477636495737 Marionette TRACE conn7 <- [1,54,null,{"value":"13"}]
23:34:55 INFO - TEST-START | /XMLHttpRequest/XMLHttpRequest-withCredentials.any.worker
23:34:55 INFO - PROCESS | 4084 | 1477636495742 Marionette TRACE conn7 -> [0,55,"executeScript",{"scriptTimeout":null,"newSandbox":true,"args":[],"filename":"executormarionette.py","script":"if (window.wrappedJSObject.win) {window.wrappedJSObject.win.close()}","sandbox":"default","line":430}]
23:34:55 INFO - PROCESS | 4084 | 1477636495852 Marionette TRACE conn7 <- [1,55,null,{"value":null}]
23:34:55 INFO - PROCESS | 4084 | 1477636495861 Marionette TRACE conn7 -> [0,56,"getWindowHandles",null]
23:34:55 INFO - PROCESS | 4084 | 1477636495864 Marionette TRACE conn7 <- [1,56,null,["13"]]
23:34:55 INFO - PROCESS | 4084 | 1477636495867 Marionette TRACE conn7 -> [0,57,"switchToWindow",{"name":"13"}]
23:34:55 INFO - PROCESS | 4084 | 1477636495873 Marionette TRACE conn7 <- [1,57,null,{}]
23:34:55 INFO - PROCESS | 4084 | 1477636495876 Marionette TRACE conn7 -> [0,58,"executeAsyncScript",{"scriptTimeout":null,"sandbox":"default","debug_script":false,"script":"/* This Source Code Form is subject to the terms of the Mozilla Public\n * License, v. 2.0. If a copy of the MPL was not distributed with this\n * file, You can obtain one at http://mozilla.org/MPL/2.0/. */\n\nwindow.wrappedJSObject.timeout_multiplier = 3;\nwindow.wrappedJSObject.explicit_timeout = 0;\n\nwindow.wrappedJSObject.addEventListener(\"message\", function listener(event) {\n if (event.data.type != \"complete\") {\n return;\n }\n window.wrappedJSObject.removeEventListener(\"message\", listener);\n clearTimeout(timer);\n var tests = event.data.tests;\n var status = event.data.status;\n\n var subtest_results = tests.map(function(x) {\n return [x.name, x.status, x.message, x.stack]\n });\n\n marionetteScriptFinished([\"/XMLHttpRequest/XMLHttpRequest-withCredentials.any.worker\",\n status.status,\n status.message,\n status.stack,\n subtest_results]);\n}, false);\n\nwindow.wrappedJSObject.win = window.open(\"http://web-platform.test:8000/XMLHttpRequest/XMLHttpRequest-withCredentials.any.worker\", \"9263aebf-3e6f-41f6-9f2e-cdafea6cd8db\");\n\nvar timer = null;\nif (30000) {\n timer = setTimeout(function() {\n log(\"Timeout fired\");\n window.wrappedJSObject.win.timeout();\n }, 30000);\n}\n","newSandbox":false,"line":445,"args":[],"filename":"executormarionette.py"}]
23:34:55 INFO - PROCESS | 4084 | ++DOCSHELL 00000076063E0000 == 11 [pid = 4084] [id = 20]
23:34:55 INFO - PROCESS | 4084 | ++DOMWINDOW == 28 (00000076063E1000) [pid = 4084] [serial = 60] [outer = 0000000000000000]
23:34:55 INFO - PROCESS | 4084 | ++DOMWINDOW == 29 (0000007606889000) [pid = 4084] [serial = 61] [outer = 00000076063E1000]
23:34:55 INFO - PROCESS | 4084 | 1477636495940 Marionette DEBUG loaded listener.js
23:34:56 INFO - PROCESS | 4084 | ++DOMWINDOW == 30 (000000760689C800) [pid = 4084] [serial = 62] [outer = 00000076063E1000]
23:34:56 INFO - PROCESS | 4084 | [4084] WARNING: Failed to retarget HTML data delivery to the parser thread.: file c:/builds/moz2_slave/fx-team-w64-d-0000000000000000/build/src/parser/html/nsHtml5StreamParser.cpp, line 970
23:35:01 INFO - PROCESS | 4084 | --DOCSHELL 0000007605BBB000 == 10 [pid = 4084] [id = 19]
23:35:01 INFO - PROCESS | 4084 | --DOCSHELL 0000007603A59800 == 9 [pid = 4084] [id = 18]
23:35:01 INFO - PROCESS | 4084 | --DOCSHELL 00000076038F1000 == 8 [pid = 4084] [id = 17]
23:35:01 INFO - PROCESS | 4084 | --DOCSHELL 0000007604DEA000 == 7 [pid = 4084] [id = 12]
23:35:01 INFO - PROCESS | 4084 | --DOMWINDOW == 29 (0000007603990800) [pid = 4084] [serial = 49] [outer = 0000000000000000] [url = about:blank]
23:35:01 INFO - PROCESS | 4084 | --DOMWINDOW == 28 (0000007603967000) [pid = 4084] [serial = 52] [outer = 0000000000000000] [url = about:blank]
23:35:04 INFO - PROCESS | 4084 | --DOMWINDOW == 27 (0000007603961800) [pid = 4084] [serial = 51] [outer = 0000000000000000] [url = http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html]
23:35:04 INFO - PROCESS | 4084 | --DOMWINDOW == 26 (0000007603A5A000) [pid = 4084] [serial = 54] [outer = 0000000000000000] [url = http://web-platform.test:8000/XMLHttpRequest/FormData-append.html]
23:35:04 INFO - PROCESS | 4084 | --DOMWINDOW == 25 (0000007605BBC000) [pid = 4084] [serial = 57] [outer = 0000000000000000] [url = http://web-platform.test:8000/XMLHttpRequest/XMLHttpRequest-withCredentials.any.html]
23:35:04 INFO - PROCESS | 4084 | --DOMWINDOW == 24 (0000007606D53000) [pid = 4084] [serial = 32] [outer = 0000000000000000] [url = about:neterror?e=dnsNotFound&u=https%3A//%25%28server%29s/selfsupport-dummy/&c=UTF-8&f=regular&d=Firefox%20can%E2%80%99t%20find%20the%20server%20at%20%25%28server%29s.]
23:35:04 INFO - PROCESS | 4084 | --DOMWINDOW == 23 (000000760561C000) [pid = 4084] [serial = 29] [outer = 0000000000000000] [url = data:application/vnd.mozilla.xul+xml;charset=utf-8,]
23:35:08 INFO - PROCESS | 4084 | --DOMWINDOW == 22 (0000007603976000) [pid = 4084] [serial = 53] [outer = 0000000000000000] [url = about:blank]
23:35:08 INFO - PROCESS | 4084 | --DOMWINDOW == 21 (0000007605BC3000) [pid = 4084] [serial = 58] [outer = 0000000000000000] [url = about:blank]
23:35:08 INFO - PROCESS | 4084 | --DOMWINDOW == 20 (0000007606889000) [pid = 4084] [serial = 61] [outer = 0000000000000000] [url = about:blank]
23:35:08 INFO - PROCESS | 4084 | --DOMWINDOW == 19 (0000007605C2E800) [pid = 4084] [serial = 59] [outer = 0000000000000000] [url = about:blank]
23:35:08 INFO - PROCESS | 4084 | --DOMWINDOW == 18 (0000007603A64000) [pid = 4084] [serial = 55] [outer = 0000000000000000] [url = about:blank]
23:35:08 INFO - PROCESS | 4084 | --DOMWINDOW == 17 (0000007604CD7800) [pid = 4084] [serial = 56] [outer = 0000000000000000] [url = about:blank]
23:35:08 INFO - PROCESS | 4084 | --DOMWINDOW == 16 (00000076038F2000) [pid = 4084] [serial = 50] [outer = 0000000000000000] [url = about:neterror?e=dnsNotFound&u=https%3A//%25%28server%29s/selfsupport-dummy/&c=UTF-8&f=regular&d=Firefox%20can%E2%80%99t%20find%20the%20server%20at%20%25%28server%29s.]
23:35:08 INFO - PROCESS | 4084 | --DOMWINDOW == 15 (00000076062A7800) [pid = 4084] [serial = 31] [outer = 0000000000000000] [url = data:application/vnd.mozilla.xul+xml;charset=utf-8,]
23:35:26 INFO - PROCESS | 4084 | MARIONETTE LOG: INFO: Timeout fired
23:35:26 INFO - PROCESS | 4084 | JavaScript error: executormarionette.py, line 33: TypeError: window.wrappedJSObject.win.timeout is not a function
23:35:30 INFO - PROCESS | 4084 | 1477636530911 Marionette TRACE conn7 <- [1,58,{"error":"script timeout","message":"Timed out","stacktrace":""},null]
23:35:30 INFO - TEST-TIMEOUT | /XMLHttpRequest/XMLHttpRequest-withCredentials.any.worker | took 35197ms
23:35:31 WARNING - u'runner_teardown' ()
23:35:31 INFO - Setting up ssl
23:35:31 INFO - PROCESS | certutil |
23:35:31 INFO - PROCESS | certutil |
23:35:31 INFO - PROCESS | certutil |
23:35:31 INFO - Certificate Nickname Trust Attributes
23:35:31 INFO - SSL,S/MIME,JAR/XPI
23:35:31 INFO -
23:35:31 INFO - web-platform-tests CT,,
23:35:31 INFO -
23:35:32 INFO - Application command: C:\slave\test\build\application\firefox\firefox.exe -marionette about:blank -profile c:\users\cltbld~1.t-w\appdata\local\temp\tmpxd_rt3.mozrunner
23:35:32 INFO - Starting runner
23:35:32 INFO - PROCESS | 3252 | [3252] WARNING: Failed to load startupcache file correctly, removing!: file c:/builds/moz2_slave/fx-team-w64-d-0000000000000000/build/src/startupcache/StartupCache.cpp, line 219
23:35:32 INFO - PROCESS | 3252 | [3252] WARNING: NS_ENSURE_SUCCESS(rv, rv) failed with result 0x80004005: file c:/builds/moz2_slave/fx-team-w64-d-0000000000000000/build/src/xpcom/base/nsSystemInfo.cpp, line 116
23:35:32 INFO - PROCESS | 3252 | [3252] WARNING: This method is lossy. Use GetCanonicalPath !: file c:/builds/moz2_slave/fx-team-w64-d-0000000000000000/build/src/xpcom/io/nsLocalFileWin.cpp, line 3579
23:35:34 INFO - PROCESS | 3252 | 1477636534508 Marionette DEBUG Marionette enabled via build flag and pref
23:35:35 INFO - PROCESS | 3252 | ++DOCSHELL 000000E24E21D000 == 1 [pid = 3252] [id = 1]
23:35:35 INFO - PROCESS | 3252 | ++DOMWINDOW == 1 (000000E24E21D800) [pid = 3252] [serial = 1] [outer = 0000000000000000]
23:35:35 INFO - PROCESS | 3252 | ++DOMWINDOW == 2 (000000E24E21E800) [pid = 3252] [serial = 2] [outer = 000000E24E21D800]
23:35:35 INFO - PROCESS | 3252 | ++DOCSHELL 000000E24EAAB000 == 2 [pid = 3252] [id = 2]
23:35:35 INFO - PROCESS | 3252 | ++DOMWINDOW == 3 (000000E25254A800) [pid = 3252] [serial = 3] [outer = 0000000000000000]
23:35:35 INFO - PROCESS | 3252 | ++DOMWINDOW == 4 (000000E25254B800) [pid = 3252] [serial = 4] [outer = 000000E25254A800]
23:35:36 INFO - PROCESS | 3252 | 1477636536077 Marionette INFO Listening on port 2829
23:35:38 INFO - PROCESS | 3252 | 1477636538072 Marionette DEBUG Marionette enabled via command-line flag
23:35:38 INFO - PROCESS | 3252 | ++DOCSHELL 000000E24F36A000 == 3 [pid = 3252] [id = 3]
23:35:38 INFO - PROCESS | 3252 | ++DOMWINDOW == 5 (000000E24F379000) [pid = 3252] [serial = 5] [outer = 0000000000000000]
23:35:38 INFO - PROCESS | 3252 | ++DOMWINDOW == 6 (000000E24F37A000) [pid = 3252] [serial = 6] [outer = 000000E24F379000]
23:35:38 INFO - PROCESS | 3252 | ++DOMWINDOW == 7 (000000E2536B4800) [pid = 3252] [serial = 7] [outer = 000000E25254A800]
23:35:38 INFO - PROCESS | 3252 | 1477636538307 Marionette DEBUG Accepted connection conn0 from 127.0.0.1:49322
23:35:38 INFO - PROCESS | 3252 | 1477636538326 Marionette DEBUG Accepted connection conn1 from 127.0.0.1:49323
23:35:38 INFO - PROCESS | 3252 | 1477636538333 Marionette DEBUG Accepted connection conn2 from 127.0.0.1:49324
23:35:38 INFO - PROCESS | 3252 | 1477636538363 Marionette DEBUG Closed connection conn0
23:35:38 INFO - PROCESS | 3252 | 1477636538365 Marionette DEBUG Closed connection conn1
23:35:38 INFO - PROCESS | 3252 | 1477636538366 Marionette DEBUG Closed connection conn2
23:35:38 INFO - PROCESS | 3252 | 1477636538372 Marionette DEBUG Accepted connection conn3 from 127.0.0.1:49325
23:35:38 INFO - PROCESS | 3252 | 1477636538459 Marionette DEBUG Closed connection conn3
23:35:38 INFO - PROCESS | 3252 | 1477636538465 Marionette DEBUG Accepted connection conn4 from 127.0.0.1:49326
23:35:38 INFO - PROCESS | 3252 | 1477636538472 Marionette DEBUG Closed connection conn4
23:35:38 INFO - PROCESS | 3252 | 1477636538477 Marionette DEBUG Accepted connection conn5 from 127.0.0.1:49327
23:35:38 INFO - PROCESS | 3252 | ++DOCSHELL 000000E24E21C800 == 4 [pid = 3252] [id = 4]
23:35:38 INFO - PROCESS | 3252 | ++DOMWINDOW == 8 (000000E256F0C000) [pid = 3252] [serial = 8] [outer = 0000000000000000]
23:35:38 INFO - PROCESS | 3252 | ++DOMWINDOW == 9 (000000E256F1E800) [pid = 3252] [serial = 9] [outer = 000000E256F0C000]
23:35:38 INFO - PROCESS | 3252 | ++DOMWINDOW == 10 (000000E257097000) [pid = 3252] [serial = 10] [outer = 000000E256F0C000]
23:35:38 INFO - PROCESS | 3252 | 1477636538655 Marionette TRACE conn5 -> [0,1,"newSession",{"sessionId":null,"capabilities":null}]
23:35:38 INFO - PROCESS | 3252 | 1477636538661 Marionette CONFIG Changing capabilities: {"browserName":"firefox","browserVersion":"52.0a1","platformName":"windows_nt","platformVersion":"6.2","specificationLevel":0,"raisesAccessibilityExceptions":false,"rotatable":false,"acceptSslCerts":false,"takesElementScreenshot":true,"takesScreenshot":true,"proxy":{},"platform":"WINDOWS_NT","XULappId":"{ec8030f7-c20a-464f-9b0e-13a3a9e97384}","appBuildId":"20161027204059","processId":3252,"version":"52.0a1"}
23:35:38 INFO - PROCESS | 3252 | [3252] WARNING: getting z level of unregistered window: file c:/builds/moz2_slave/fx-team-w64-d-0000000000000000/build/src/xpfe/appshell/nsWindowMediator.cpp, line 623
23:35:38 INFO - PROCESS | 3252 | [3252] WARNING: getting z level of unregistered window: file c:/builds/moz2_slave/fx-team-w64-d-0000000000000000/build/src/xpfe/appshell/nsWindowMediator.cpp, line 623
23:35:39 INFO - PROCESS | 3252 | [3252] WARNING: attempt to modify an immutable nsStandardURL: file c:/builds/moz2_slave/fx-team-w64-d-0000000000000000/build/src/netwerk/base/nsStandardURL.cpp, line 1553
23:35:39 INFO - PROCESS | 3252 | [3252] WARNING: attempt to modify an immutable nsStandardURL: file c:/builds/moz2_slave/fx-team-w64-d-0000000000000000/build/src/netwerk/base/nsStandardURL.cpp, line 1553
23:35:39 INFO - PROCESS | 3252 | [3252] WARNING: Failed to retarget HTML data delivery to the parser thread.: file c:/builds/moz2_slave/fx-team-w64-d-0000000000000000/build/src/parser/html/nsHtml5StreamParser.cpp, line 970
23:35:39 INFO - PROCESS | 3252 | ++DOCSHELL 000000E25A9C6800 == 5 [pid = 3252] [id = 5]
23:35:39 INFO - PROCESS | 3252 | ++DOMWINDOW == 11 (000000E25A9C7000) [pid = 3252] [serial = 11] [outer = 0000000000000000]
23:35:39 INFO - PROCESS | 3252 | ++DOCSHELL 000000E25A9C8000 == 6 [pid = 3252] [id = 6]
23:35:39 INFO - PROCESS | 3252 | ++DOMWINDOW == 12 (000000E25A9C8800) [pid = 3252] [serial = 12] [outer = 0000000000000000]
23:35:40 INFO - PROCESS | 3252 | ++DOCSHELL 000000E25B384000 == 7 [pid = 3252] [id = 7]
23:35:40 INFO - PROCESS | 3252 | ++DOMWINDOW == 13 (000000E25B393000) [pid = 3252] [serial = 13] [outer = 0000000000000000]
23:35:40 INFO - PROCESS | 3252 | ++DOMWINDOW == 14 (000000E25B61B800) [pid = 3252] [serial = 14] [outer = 000000E25B393000]
23:35:40 INFO - PROCESS | 3252 | ++DOMWINDOW == 15 (000000E25B842800) [pid = 3252] [serial = 15] [outer = 000000E25A9C7000]
23:35:40 INFO - PROCESS | 3252 | ++DOMWINDOW == 16 (000000E25B845800) [pid = 3252] [serial = 16] [outer = 000000E25A9C8800]
23:35:40 INFO - PROCESS | 3252 | ++DOMWINDOW == 17 (000000E25B84A000) [pid = 3252] [serial = 17] [outer = 000000E25B393000]
23:35:41 INFO - PROCESS | 3252 | 1477636541165 Marionette DEBUG loaded listener.js
23:35:42 INFO - PROCESS | 3252 | ++DOMWINDOW == 18 (000000E25BB94000) [pid = 3252] [serial = 18] [outer = 000000E25B393000]
23:35:42 INFO - PROCESS | 3252 | 1477636542186 Marionette TRACE conn5 <- [1,1,null,{"sessionId":"0e814c65-618e-409c-ad39-936e1389342c","capabilities":{"browserName":"firefox","browserVersion":"52.0a1","platformName":"windows_nt","platformVersion":"6.2","specificationLevel":0,"raisesAccessibilityExceptions":false,"rotatable":false,"acceptSslCerts":false,"takesElementScreenshot":true,"takesScreenshot":true,"proxy":{},"platform":"WINDOWS_NT","XULappId":"{ec8030f7-c20a-464f-9b0e-13a3a9e97384}","appBuildId":"20161027204059","processId":3252,"version":"52.0a1","command_id":1}}]
23:35:42 INFO - PROCESS | 3252 | 1477636542331 Marionette TRACE conn5 -> [0,2,"executeScript",{"scriptTimeout":null,"newSandbox":true,"args":[],"filename":"executormarionette.py","script":"if (window.wrappedJSObject.win) {window.wrappedJSObject.win.close()}","sandbox":"default","line":137}]
23:35:42 INFO - PROCESS | 3252 | 1477636542416 Marionette TRACE conn5 <- [1,2,null,{"value":null}]
23:35:42 INFO - PROCESS | 3252 | 1477636542519 Marionette TRACE conn5 -> [0,3,"getWindowHandle",null]
23:35:42 INFO - PROCESS | 3252 | 1477636542523 Marionette TRACE conn5 <- [1,3,null,{"value":"13"}]
23:35:42 INFO - PROCESS | 3252 | 1477636542550 Marionette TRACE conn5 -> [0,4,"get",{"url":"http://web-platform.test:8000/testharness_runner.html"}]
23:35:42 INFO - PROCESS | 3252 | [3252] WARNING: Could not get disk status from nsIDiskSpaceWatcher: file c:/builds/moz2_slave/fx-team-w64-d-0000000000000000/build/src/uriloader/prefetch/nsOfflineCacheUpdateService.cpp, line 283
23:35:43 INFO - PROCESS | 3252 | ++DOMWINDOW == 19 (000000E26026C000) [pid = 3252] [serial = 19] [outer = 000000E25B393000]
23:35:43 INFO - PROCESS | 3252 | 1477636543868 Marionette TRACE conn5 <- [1,4,null,{}]
23:35:43 INFO - PROCESS | 3252 | 1477636543879 Marionette TRACE conn5 -> [0,5,"executeScript",{"scriptTimeout":null,"newSandbox":true,"args":[],"filename":"executormarionette.py","script":"document.title = 'MainThread'","sandbox":"default","line":150}]
23:35:43 INFO - PROCESS | 3252 | 1477636543904 Marionette TRACE conn5 <- [1,5,null,{"value":null}]
23:35:43 INFO - PROCESS | 3252 | 1477636543929 Marionette TRACE conn5 -> [0,6,"getWindowHandle",null]
23:35:43 INFO - PROCESS | 3252 | 1477636543934 Marionette TRACE conn5 <- [1,6,null,{"value":"13"}]
23:35:43 INFO - PROCESS | 3252 | 1477636543938 Marionette TRACE conn5 -> [0,7,"timeouts",{"script":35000}]
23:35:43 INFO - TEST-START | /XMLHttpRequest/abort-after-receive.htm
23:35:43 INFO - PROCESS | 3252 | 1477636543941 Marionette TRACE conn5 <- [1,7,null,{}]
23:35:43 INFO - PROCESS | 3252 | 1477636543946 Marionette TRACE conn5 -> [0,8,"executeScript",{"scriptTimeout":null,"newSandbox":true,"args":[],"filename":"executormarionette.py","script":"if (window.wrappedJSObject.win) {window.wrappedJSObject.win.close()}","sandbox":"default","line":430}]
23:35:43 INFO - PROCESS | 3252 | 1477636543980 Marionette TRACE conn5 <- [1,8,null,{"value":null}]
23:35:43 INFO - PROCESS | 3252 | 1477636543992 Marionette TRACE conn5 -> [0,9,"getWindowHandles",null]
23:35:43 INFO - PROCESS | 3252 | 1477636543994 Marionette TRACE conn5 <- [1,9,null,["13"]]
23:35:44 INFO - PROCESS | 3252 | 1477636544010 Marionette TRACE conn5 -> [0,10,"switchToWindow",{"name":"13"}]
23:35:44 INFO - PROCESS | 3252 | 1477636544014 Marionette TRACE conn5 <- [1,10,null,{}]
23:35:44 INFO - PROCESS | 3252 | 1477636544072 Marionette TRACE conn5 -> [0,11,"executeAsyncScript",{"scriptTimeout":null,"sandbox":"default","debug_script":false,"script":"/* This Source Code Form is subject to the terms of the Mozilla Public\n * License, v. 2.0. If a copy of the MPL was not distributed with this\n * file, You can obtain one at http://mozilla.org/MPL/2.0/. */\n\nwindow.wrappedJSObject.timeout_multiplier = 3;\nwindow.wrappedJSObject.explicit_timeout = 0;\n\nwindow.wrappedJSObject.addEventListener(\"message\", function listener(event) {\n if (event.data.type != \"complete\") {\n return;\n }\n window.wrappedJSObject.removeEventListener(\"message\", listener);\n clearTimeout(timer);\n var tests = event.data.tests;\n var status = event.data.status;\n\n var subtest_results = tests.map(function(x) {\n return [x.name, x.status, x.message, x.stack]\n });\n\n marionetteScriptFinished([\"/XMLHttpRequest/abort-after-receive.htm\",\n status.status,\n status.message,\n status.stack,\n subtest_results]);\n}, false);\n\nwindow.wrappedJSObject.win = window.open(\"http://web-platform.test:8000/XMLHttpRequest/abort-after-receive.htm\", \"9298bc64-aba3-4cf2-8943-12823d317f6b\");\n\nvar timer = null;\nif (30000) {\n timer = setTimeout(function() {\n log(\"Timeout fired\");\n window.wrappedJSObject.win.timeout();\n }, 30000);\n}\n","newSandbox":false,"line":445,"args":[],"filename":"executormarionette.py"}]
23:35:44 INFO - PROCESS | 3252 | ++DOCSHELL 000000E260F1A800 == 8 [pid = 3252] [id = 8]
23:35:44 INFO - PROCESS | 3252 | ++DOMWINDOW == 20 (000000E260F1B000) [pid = 3252] [serial = 20] [outer = 0000000000000000]
23:35:44 INFO - PROCESS | 3252 | ++DOMWINDOW == 21 (000000E260F1E800) [pid = 3252] [serial = 21] [outer = 000000E260F1B000]
23:35:44 INFO - PROCESS | 3252 | 1477636544139 Marionette DEBUG loaded listener.js
23:35:44 INFO - PROCESS | 3252 | ++DOMWINDOW == 22 (000000E260F1F800) [pid = 3252] [serial = 22] [outer = 000000E260F1B000]
23:35:44 INFO - PROCESS | 3252 | ++DOCSHELL 000000E2604BC000 == 9 [pid = 3252] [id = 9]
23:35:44 INFO - PROCESS | 3252 | ++DOMWINDOW == 23 (000000E260DB4800) [pid = 3252] [serial = 23] [outer = 0000000000000000]
23:35:44 INFO - PROCESS | 3252 | ++DOMWINDOW == 24 (000000E260D7A800) [pid = 3252] [serial = 24] [outer = 000000E260DB4800]
23:35:44 INFO - PROCESS | 3252 | 1477636544449 Marionette DEBUG loaded listener.js
23:35:44 INFO - PROCESS | 3252 | ++DOMWINDOW == 25 (000000E260D8E800) [pid = 3252] [serial = 25] [outer = 000000E260DB4800]
23:35:44 INFO - PROCESS | 3252 | 1477636544912 Marionette TRACE conn5 <- [1,11,null,{"value":["/XMLHttpRequest/abort-after-receive.htm",0,null,null,[["XMLHttpRequest: abort() after successful receive should not fire \"abort\" event",0,null,null]]]}]
23:35:44 INFO - .
23:35:44 INFO - TEST-OK | /XMLHttpRequest/abort-after-receive.htm | took 1032ms
23:35:44 INFO - PROCESS | 3252 | 1477636544973 Marionette TRACE conn5 -> [0,12,"getWindowHandle",null]
23:35:44 INFO - PROCESS | 3252 | 1477636544976 Marionette TRACE conn5 <- [1,12,null,{"value":"13"}]
23:35:44 INFO - TEST-START | /XMLHttpRequest/abort-after-send.htm
23:35:44 INFO - PROCESS | 3252 | 1477636544981 Marionette TRACE conn5 -> [0,13,"executeScript",{"scriptTimeout":null,"newSandbox":true,"args":[],"filename":"executormarionette.py","script":"if (window.wrappedJSObject.win) {window.wrappedJSObject.win.close()}","sandbox":"default","line":430}]
23:35:45 INFO - PROCESS | 3252 | 1477636545109 Marionette TRACE conn5 <- [1,13,null,{"value":null}]
23:35:45 INFO - PROCESS | 3252 | 1477636545117 Marionette TRACE conn5 -> [0,14,"getWindowHandles",null]
23:35:45 INFO - PROCESS | 3252 | 1477636545119 Marionette TRACE conn5 <- [1,14,null,["13"]]
23:35:45 INFO - PROCESS | 3252 | 1477636545124 Marionette TRACE conn5 -> [0,15,"switchToWindow",{"name":"13"}]
23:35:45 INFO - PROCESS | 3252 | 1477636545128 Marionette TRACE conn5 <- [1,15,null,{}]
23:35:45 INFO - PROCESS | 3252 | 1477636545131 Marionette TRACE conn5 -> [0,16,"executeAsyncScript",{"scriptTimeout":null,"sandbox":"default","debug_script":false,"script":"/* This Source Code Form is subject to the terms of the Mozilla Public\n * License, v. 2.0. If a copy of the MPL was not distributed with this\n * file, You can obtain one at http://mozilla.org/MPL/2.0/. */\n\nwindow.wrappedJSObject.timeout_multiplier = 3;\nwindow.wrappedJSObject.explicit_timeout = 0;\n\nwindow.wrappedJSObject.addEventListener(\"message\", function listener(event) {\n if (event.data.type != \"complete\") {\n return;\n }\n window.wrappedJSObject.removeEventListener(\"message\", listener);\n clearTimeout(timer);\n var tests = event.data.tests;\n var status = event.data.status;\n\n var subtest_results = tests.map(function(x) {\n return [x.name, x.status, x.message, x.stack]\n });\n\n marionetteScriptFinished([\"/XMLHttpRequest/abort-after-send.htm\",\n status.status,\n status.message,\n status.stack,\n subtest_results]);\n}, false);\n\nwindow.wrappedJSObject.win = window.open(\"http://web-platform.test:8000/XMLHttpRequest/abort-after-send.htm\", \"9298bc64-aba3-4cf2-8943-12823d317f6b\");\n\nvar timer = null;\nif (30000) {\n timer = setTimeout(function() {\n log(\"Timeout fired\");\n window.wrappedJSObject.win.timeout();\n }, 30000);\n}\n","newSandbox":false,"line":445,"args":[],"filename":"executormarionette.py"}]
23:35:45 INFO - PROCESS | 3252 | ++DOCSHELL 000000E261B23000 == 10 [pid = 3252] [id = 10]
23:35:45 INFO - PROCESS | 3252 | ++DOMWINDOW == 26 (000000E261B23800) [pid = 3252] [serial = 26] [outer = 0000000000000000]
23:35:45 INFO - PROCESS | 3252 | ++DOMWINDOW == 27 (000000E261B27800) [pid = 3252] [serial = 27] [outer = 000000E261B23800]
23:35:45 INFO - PROCESS | 3252 | 1477636545186 Marionette DEBUG loaded listener.js
23:35:45 INFO - PROCESS | 3252 | ++DOMWINDOW == 28 (000000E261C74000) [pid = 3252] [serial = 28] [outer = 000000E261B23800]
23:35:46 INFO - PROCESS | 3252 | --DOCSHELL 000000E24E21C800 == 9 [pid = 3252] [id = 4]
23:35:46 INFO - PROCESS | 3252 | --DOCSHELL 000000E24E21D000 == 8 [pid = 3252] [id = 1]
23:35:46 INFO - PROCESS | 3252 | 1477636546649 Marionette TRACE conn5 <- [1,16,null,{"value":["/XMLHttpRequest/abort-after-send.htm",0,null,null,[["XMLHttpRequest: abort() after send()",0,null,null]]]}]
23:35:46 INFO - .
23:35:46 INFO - TEST-OK | /XMLHttpRequest/abort-after-send.htm | took 1737ms
23:35:46 INFO - PROCESS | 3252 | 1477636546722 Marionette TRACE conn5 -> [0,17,"getWindowHandle",null]
23:35:46 INFO - PROCESS | 3252 | 1477636546727 Marionette TRACE conn5 <- [1,17,null,{"value":"13"}]
23:35:46 INFO - TEST-START | /XMLHttpRequest/abort-after-stop.htm
23:35:46 INFO - PROCESS | 3252 | 1477636546736 Marionette TRACE conn5 -> [0,18,"executeScript",{"scriptTimeout":null,"newSandbox":true,"args":[],"filename":"executormarionette.py","script":"if (window.wrappedJSObject.win) {window.wrappedJSObject.win.close()}","sandbox":"default","line":430}]
23:35:46 INFO - PROCESS | 3252 | 1477636546866 Marionette TRACE conn5 <- [1,18,null,{"value":null}]
23:35:46 INFO - PROCESS | 3252 | 1477636546913 Marionette TRACE conn5 -> [0,19,"getWindowHandles",null]
23:35:46 INFO - PROCESS | 3252 | 1477636546918 Marionette TRACE conn5 <- [1,19,null,["13"]]
23:35:46 INFO - PROCESS | 3252 | 1477636546923 Marionette TRACE conn5 -> [0,20,"switchToWindow",{"name":"13"}]
23:35:46 INFO - PROCESS | 3252 | 1477636546929 Marionette TRACE conn5 <- [1,20,null,{}]
23:35:46 INFO - PROCESS | 3252 | 1477636546933 Marionette TRACE conn5 -> [0,21,"executeAsyncScript",{"scriptTimeout":null,"sandbox":"default","debug_script":false,"script":"/* This Source Code Form is subject to the terms of the Mozilla Public\n * License, v. 2.0. If a copy of the MPL was not distributed with this\n * file, You can obtain one at http://mozilla.org/MPL/2.0/. */\n\nwindow.wrappedJSObject.timeout_multiplier = 3;\nwindow.wrappedJSObject.explicit_timeout = 0;\n\nwindow.wrappedJSObject.addEventListener(\"message\", function listener(event) {\n if (event.data.type != \"complete\") {\n return;\n }\n window.wrappedJSObject.removeEventListener(\"message\", listener);\n clearTimeout(timer);\n var tests = event.data.tests;\n var status = event.data.status;\n\n var subtest_results = tests.map(function(x) {\n return [x.name, x.status, x.message, x.stack]\n });\n\n marionetteScriptFinished([\"/XMLHttpRequest/abort-after-stop.htm\",\n status.status,\n status.message,\n status.stack,\n subtest_results]);\n}, false);\n\nwindow.wrappedJSObject.win = window.open(\"http://web-platform.test:8000/XMLHttpRequest/abort-after-stop.htm\", \"9298bc64-aba3-4cf2-8943-12823d317f6b\");\n\nvar timer = null;\nif (30000) {\n timer = setTimeout(function() {\n log(\"Timeout fired\");\n window.wrappedJSObject.win.timeout();\n }, 30000);\n}\n","newSandbox":false,"line":445,"args":[],"filename":"executormarionette.py"}]
23:35:46 INFO - PROCESS | 3252 | ++DOCSHELL 000000E24DED7800 == 9 [pid = 3252] [id = 11]
23:35:46 INFO - PROCESS | 3252 | ++DOMWINDOW == 29 (000000E24DED8000) [pid = 3252] [serial = 29] [outer = 0000000000000000]
23:35:47 INFO - PROCESS | 3252 | ++DOMWINDOW == 30 (000000E24DEDE000) [pid = 3252] [serial = 30] [outer = 000000E24DED8000]
23:35:47 INFO - PROCESS | 3252 | 1477636546997 Marionette DEBUG loaded listener.js
23:35:47 INFO - PROCESS | 3252 | ++DOMWINDOW == 31 (000000E24E21D000) [pid = 3252] [serial = 31] [outer = 000000E24DED8000]
23:35:47 INFO - PROCESS | 3252 | ++DOCSHELL 000000E24E603000 == 10 [pid = 3252] [id = 12]
23:35:47 INFO - PROCESS | 3252 | ++DOMWINDOW == 32 (000000E24E603800) [pid = 3252] [serial = 32] [outer = 0000000000000000]
23:35:47 INFO - PROCESS | 3252 | ++DOMWINDOW == 33 (000000E24E60D800) [pid = 3252] [serial = 33] [outer = 000000E24E603800]
23:35:47 INFO - PROCESS | 3252 | ++DOMWINDOW == 34 (000000E24E94A800) [pid = 3252] [serial = 34] [outer = 000000E24E603800]
23:35:47 INFO - PROCESS | 3252 | ++DOCSHELL 000000E24C48C000 == 11 [pid = 3252] [id = 13]
23:35:47 INFO - PROCESS | 3252 | ++DOMWINDOW == 35 (000000E24E999800) [pid = 3252] [serial = 35] [outer = 0000000000000000]
23:35:47 INFO - PROCESS | 3252 | ++DOMWINDOW == 36 (000000E24EA07800) [pid = 3252] [serial = 36] [outer = 000000E24E999800]
23:35:47 INFO - PROCESS | 3252 | ++DOMWINDOW == 37 (000000E24EAAB800) [pid = 3252] [serial = 37] [outer = 000000E24E999800]
23:35:53 INFO - PROCESS | 3252 | --DOMWINDOW == 36 (000000E261B23800) [pid = 3252] [serial = 26] [outer = 0000000000000000] [url = http://web-platform.test:8000/XMLHttpRequest/abort-after-send.htm]
23:35:53 INFO - PROCESS | 3252 | --DOMWINDOW == 35 (000000E260F1B000) [pid = 3252] [serial = 20] [outer = 0000000000000000] [url = http://web-platform.test:8000/XMLHttpRequest/abort-after-receive.htm]
23:35:53 INFO - PROCESS | 3252 | --DOMWINDOW == 34 (000000E256F0C000) [pid = 3252] [serial = 8] [outer = 0000000000000000] [url = chrome://gfxsanity/content/sanitytest.html]
23:35:53 INFO - PROCESS | 3252 | --DOMWINDOW == 33 (000000E24E21D800) [pid = 3252] [serial = 1] [outer = 0000000000000000] [url = chrome://gfxsanity/content/sanityparent.html]
23:35:57 INFO - PROCESS | 3252 | --DOCSHELL 000000E260F1A800 == 10 [pid = 3252] [id = 8]
23:35:57 INFO - PROCESS | 3252 | --DOCSHELL 000000E261B23000 == 9 [pid = 3252] [id = 10]
23:35:58 INFO - PROCESS | 3252 | --DOMWINDOW == 32 (000000E260D7A800) [pid = 3252] [serial = 24] [outer = 0000000000000000] [url = about:blank]
23:35:58 INFO - PROCESS | 3252 | --DOMWINDOW == 31 (000000E25B84A000) [pid = 3252] [serial = 17] [outer = 0000000000000000] [url = about:blank]
23:35:58 INFO - PROCESS | 3252 | --DOMWINDOW == 30 (000000E25B61B800) [pid = 3252] [serial = 14] [outer = 0000000000000000] [url = about:blank]
23:35:58 INFO - PROCESS | 3252 | --DOMWINDOW == 29 (000000E256F1E800) [pid = 3252] [serial = 9] [outer = 0000000000000000] [url = about:blank]
23:35:58 INFO - PROCESS | 3252 | --DOMWINDOW == 28 (000000E257097000) [pid = 3252] [serial = 10] [outer = 0000000000000000] [url = chrome://gfxsanity/content/sanitytest.html]
23:35:58 INFO - PROCESS | 3252 | --DOMWINDOW == 27 (000000E24E21E800) [pid = 3252] [serial = 2] [outer = 0000000000000000] [url = about:blank]
23:35:58 INFO - PROCESS | 3252 | --DOMWINDOW == 26 (000000E25254B800) [pid = 3252] [serial = 4] [outer = 0000000000000000] [url = about:blank]
23:35:58 INFO - PROCESS | 3252 | --DOMWINDOW == 25 (000000E24EA07800) [pid = 3252] [serial = 36] [outer = 0000000000000000] [url = about:blank]
23:35:58 INFO - PROCESS | 3252 | --DOMWINDOW == 24 (000000E24DEDE000) [pid = 3252] [serial = 30] [outer = 0000000000000000] [url = about:blank]
23:35:58 INFO - PROCESS | 3252 | --DOMWINDOW == 23 (000000E261B27800) [pid = 3252] [serial = 27] [outer = 0000000000000000] [url = about:blank]
23:35:58 INFO - PROCESS | 3252 | --DOMWINDOW == 22 (000000E261C74000) [pid = 3252] [serial = 28] [outer = 0000000000000000] [url = about:blank]
23:35:58 INFO - PROCESS | 3252 | --DOMWINDOW == 21 (000000E260F1E800) [pid = 3252] [serial = 21] [outer = 0000000000000000] [url = about:blank]
23:35:58 INFO - PROCESS | 3252 | --DOMWINDOW == 20 (000000E260F1F800) [pid = 3252] [serial = 22] [outer = 0000000000000000] [url = about:blank]
23:35:58 INFO - PROCESS | 3252 | --DOMWINDOW == 19 (000000E24E60D800) [pid = 3252] [serial = 33] [outer = 0000000000000000] [url = about:blank]
23:36:17 INFO - PROCESS | 3252 | MARIONETTE LOG: INFO: Timeout fired
23:36:17 INFO - PROCESS | 3252 | 1477636577165 Marionette TRACE conn5 <- [1,21,null,{"value":["/XMLHttpRequest/abort-after-stop.htm",2,null,null,[["XMLHttpRequest: abort event should fire when stop() method is used",1,"assert_equals: expected true but got false","@http://web-platform.test:8000/XMLHttpRequest/abort-after-stop.htm:24:13\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\n@http://web-platform.test:8000/XMLHttpRequest/abort-after-stop.htm:23:11\nsetTimeout handler*@http://web-platform.test:8000/XMLHttpRequest/abort-after-stop.htm:22:9\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\n@http://web-platform.test:8000/XMLHttpRequest/abort-after-stop.htm:13:7\n"]]]}]
23:36:17 INFO - .
23:36:17 INFO - TEST-TIMEOUT | /XMLHttpRequest/abort-after-stop.htm | took 30483ms
23:36:17 INFO - PROCESS | 3252 | 1477636577218 Marionette TRACE conn5 -> [0,22,"getWindowHandle",null]
23:36:17 INFO - PROCESS | 3252 | 1477636577223 Marionette TRACE conn5 <- [1,22,null,{"value":"13"}]
23:36:17 INFO - TEST-START | /XMLHttpRequest/abort-after-timeout.htm
23:36:17 INFO - PROCESS | 3252 | 1477636577230 Marionette TRACE conn5 -> [0,23,"executeScript",{"scriptTimeout":null,"newSandbox":true,"args":[],"filename":"executormarionette.py","script":"if (window.wrappedJSObject.win) {window.wrappedJSObject.win.close()}","sandbox":"default","line":430}]
23:36:17 INFO - PROCESS | 3252 | 1477636577361 Marionette TRACE conn5 <- [1,23,null,{"value":null}]
23:36:17 INFO - PROCESS | 3252 | 1477636577389 Marionette TRACE conn5 -> [0,24,"getWindowHandles",null]
23:36:17 INFO - PROCESS | 3252 | 1477636577393 Marionette TRACE conn5 <- [1,24,null,["13"]]
23:36:17 INFO - PROCESS | 3252 | 1477636577399 Marionette TRACE conn5 -> [0,25,"switchToWindow",{"name":"13"}]
23:36:17 INFO - PROCESS | 3252 | 1477636577406 Marionette TRACE conn5 <- [1,25,null,{}]
23:36:17 INFO - PROCESS | 3252 | 1477636577410 Marionette TRACE conn5 -> [0,26,"executeAsyncScript",{"scriptTimeout":null,"sandbox":"default","debug_script":false,"script":"/* This Source Code Form is subject to the terms of the Mozilla Public\n * License, v. 2.0. If a copy of the MPL was not distributed with this\n * file, You can obtain one at http://mozilla.org/MPL/2.0/. */\n\nwindow.wrappedJSObject.timeout_multiplier = 3;\nwindow.wrappedJSObject.explicit_timeout = 0;\n\nwindow.wrappedJSObject.addEventListener(\"message\", function listener(event) {\n if (event.data.type != \"complete\") {\n return;\n }\n window.wrappedJSObject.removeEventListener(\"message\", listener);\n clearTimeout(timer);\n var tests = event.data.tests;\n var status = event.data.status;\n\n var subtest_results = tests.map(function(x) {\n return [x.name, x.status, x.message, x.stack]\n });\n\n marionetteScriptFinished([\"/XMLHttpRequest/abort-after-timeout.htm\",\n status.status,\n status.message,\n status.stack,\n subtest_results]);\n}, false);\n\nwindow.wrappedJSObject.win = window.open(\"http://web-platform.test:8000/XMLHttpRequest/abort-after-timeout.htm\", \"9298bc64-aba3-4cf2-8943-12823d317f6b\");\n\nvar timer = null;\nif (30000) {\n timer = setTimeout(function() {\n log(\"Timeout fired\");\n window.wrappedJSObject.win.timeout();\n }, 30000);\n}\n","newSandbox":false,"line":445,"args":[],"filename":"executormarionette.py"}]
23:36:17 INFO - PROCESS | 3252 | ++DOCSHELL 000000E24DECF800 == 10 [pid = 3252] [id = 14]
23:36:17 INFO - PROCESS | 3252 | ++DOMWINDOW == 20 (000000E24DED0800) [pid = 3252] [serial = 38] [outer = 0000000000000000]
23:36:17 INFO - PROCESS | 3252 | ++DOMWINDOW == 21 (000000E24DEDA800) [pid = 3252] [serial = 39] [outer = 000000E24DED0800]
23:36:17 INFO - PROCESS | 3252 | 1477636577490 Marionette DEBUG loaded listener.js
23:36:17 INFO - PROCESS | 3252 | ++DOMWINDOW == 22 (000000E24E220000) [pid = 3252] [serial = 40] [outer = 000000E24DED0800]
23:36:17 INFO - PROCESS | 3252 | ++DOMWINDOW == 23 (000000E24E964000) [pid = 3252] [serial = 41] [outer = 000000E24E999800]
23:36:18 INFO - PROCESS | 3252 | 1477636578152 Marionette TRACE conn5 <- [1,26,null,{"value":["/XMLHttpRequest/abort-after-timeout.htm",0,null,null,[["XMLHttpRequest: abort() after a timeout should not fire \"abort\" event",0,null,null]]]}]
23:36:18 INFO - .
23:36:18 INFO - TEST-OK | /XMLHttpRequest/abort-after-timeout.htm | took 985ms
23:36:18 INFO - PROCESS | 3252 | 1477636578217 Marionette TRACE conn5 -> [0,27,"getWindowHandle",null]
23:36:18 INFO - PROCESS | 3252 | 1477636578221 Marionette TRACE conn5 <- [1,27,null,{"value":"13"}]
23:36:18 INFO - TEST-START | /XMLHttpRequest/abort-during-done.htm
23:36:18 INFO - PROCESS | 3252 | 1477636578226 Marionette TRACE conn5 -> [0,28,"executeScript",{"scriptTimeout":null,"newSandbox":true,"args":[],"filename":"executormarionette.py","script":"if (window.wrappedJSObject.win) {window.wrappedJSObject.win.close()}","sandbox":"default","line":430}]
23:36:18 INFO - PROCESS | 3252 | 1477636578353 Marionette TRACE conn5 <- [1,28,null,{"value":null}]
23:36:18 INFO - PROCESS | 3252 | 1477636578362 Marionette TRACE conn5 -> [0,29,"getWindowHandles",null]
23:36:18 INFO - PROCESS | 3252 | 1477636578365 Marionette TRACE conn5 <- [1,29,null,["13"]]
23:36:18 INFO - PROCESS | 3252 | 1477636578369 Marionette TRACE conn5 -> [0,30,"switchToWindow",{"name":"13"}]
23:36:18 INFO - PROCESS | 3252 | 1477636578373 Marionette TRACE conn5 <- [1,30,null,{}]
23:36:18 INFO - PROCESS | 3252 | 1477636578377 Marionette TRACE conn5 -> [0,31,"executeAsyncScript",{"scriptTimeout":null,"sandbox":"default","debug_script":false,"script":"/* This Source Code Form is subject to the terms of the Mozilla Public\n * License, v. 2.0. If a copy of the MPL was not distributed with this\n * file, You can obtain one at http://mozilla.org/MPL/2.0/. */\n\nwindow.wrappedJSObject.timeout_multiplier = 3;\nwindow.wrappedJSObject.explicit_timeout = 0;\n\nwindow.wrappedJSObject.addEventListener(\"message\", function listener(event) {\n if (event.data.type != \"complete\") {\n return;\n }\n window.wrappedJSObject.removeEventListener(\"message\", listener);\n clearTimeout(timer);\n var tests = event.data.tests;\n var status = event.data.status;\n\n var subtest_results = tests.map(function(x) {\n return [x.name, x.status, x.message, x.stack]\n });\n\n marionetteScriptFinished([\"/XMLHttpRequest/abort-during-done.htm\",\n status.status,\n status.message,\n status.stack,\n subtest_results]);\n}, false);\n\nwindow.wrappedJSObject.win = window.open(\"http://web-platform.test:8000/XMLHttpRequest/abort-during-done.htm\", \"9298bc64-aba3-4cf2-8943-12823d317f6b\");\n\nvar timer = null;\nif (30000) {\n timer = setTimeout(function() {\n log(\"Timeout fired\");\n window.wrappedJSObject.win.timeout();\n }, 30000);\n}\n","newSandbox":false,"line":445,"args":[],"filename":"executormarionette.py"}]
23:36:18 INFO - PROCESS | 3252 | ++DOCSHELL 000000E24F366800 == 11 [pid = 3252] [id = 15]
23:36:18 INFO - PROCESS | 3252 | ++DOMWINDOW == 24 (000000E24F369800) [pid = 3252] [serial = 42] [outer = 0000000000000000]
23:36:18 INFO - PROCESS | 3252 | ++DOMWINDOW == 25 (000000E2525EF000) [pid = 3252] [serial = 43] [outer = 000000E24F369800]
23:36:18 INFO - PROCESS | 3252 | 1477636578433 Marionette DEBUG loaded listener.js
23:36:18 INFO - PROCESS | 3252 | ++DOMWINDOW == 26 (000000E253050800) [pid = 3252] [serial = 44] [outer = 000000E24F369800]
23:36:18 INFO - PROCESS | 3252 | 1477636578788 Marionette TRACE conn5 <- [1,31,null,{"value":["/XMLHttpRequest/abort-during-done.htm",0,null,null,[["XMLHttpRequest: abort() during DONE",0,null,null]]]}]
23:36:18 INFO - .
23:36:18 INFO - TEST-OK | /XMLHttpRequest/abort-during-done.htm | took 567ms
23:36:18 INFO - PROCESS | 3252 | 1477636578803 Marionette TRACE conn5 -> [0,32,"getWindowHandle",null]
23:36:18 INFO - PROCESS | 3252 | 1477636578809 Marionette TRACE conn5 <- [1,32,null,{"value":"13"}]
23:36:18 INFO - TEST-START | /XMLHttpRequest/abort-during-open.htm
23:36:18 INFO - PROCESS | 3252 | 1477636578813 Marionette TRACE conn5 -> [0,33,"executeScript",{"scriptTimeout":null,"newSandbox":true,"args":[],"filename":"executormarionette.py","script":"if (window.wrappedJSObject.win) {window.wrappedJSObject.win.close()}","sandbox":"default","line":430}]
23:36:18 INFO - PROCESS | 3252 | 1477636578919 Marionette TRACE conn5 <- [1,33,null,{"value":null}]
23:36:18 INFO - PROCESS | 3252 | 1477636578969 Marionette TRACE conn5 -> [0,34,"getWindowHandles",null]
23:36:18 INFO - PROCESS | 3252 | 1477636578972 Marionette TRACE conn5 <- [1,34,null,["13"]]
23:36:18 INFO - PROCESS | 3252 | 1477636578976 Marionette TRACE conn5 -> [0,35,"switchToWindow",{"name":"13"}]
23:36:18 INFO - PROCESS | 3252 | 1477636578982 Marionette TRACE conn5 <- [1,35,null,{}]
23:36:18 INFO - PROCESS | 3252 | 1477636578986 Marionette TRACE conn5 -> [0,36,"executeAsyncScript",{"scriptTimeout":null,"sandbox":"default","debug_script":false,"script":"/* This Source Code Form is subject to the terms of the Mozilla Public\n * License, v. 2.0. If a copy of the MPL was not distributed with this\n * file, You can obtain one at http://mozilla.org/MPL/2.0/. */\n\nwindow.wrappedJSObject.timeout_multiplier = 3;\nwindow.wrappedJSObject.explicit_timeout = 0;\n\nwindow.wrappedJSObject.addEventListener(\"message\", function listener(event) {\n if (event.data.type != \"complete\") {\n return;\n }\n window.wrappedJSObject.removeEventListener(\"message\", listener);\n clearTimeout(timer);\n var tests = event.data.tests;\n var status = event.data.status;\n\n var subtest_results = tests.map(function(x) {\n return [x.name, x.status, x.message, x.stack]\n });\n\n marionetteScriptFinished([\"/XMLHttpRequest/abort-during-open.htm\",\n status.status,\n status.message,\n status.stack,\n subtest_results]);\n}, false);\n\nwindow.wrappedJSObject.win = window.open(\"http://web-platform.test:8000/XMLHttpRequest/abort-during-open.htm\", \"9298bc64-aba3-4cf2-8943-12823d317f6b\");\n\nvar timer = null;\nif (30000) {\n timer = setTimeout(function() {\n log(\"Timeout fired\");\n window.wrappedJSObject.win.timeout();\n }, 30000);\n}\n","newSandbox":false,"line":445,"args":[],"filename":"executormarionette.py"}]
23:36:19 INFO - PROCESS | 3252 | ++DOCSHELL 000000E253716800 == 12 [pid = 3252] [id = 16]
23:36:19 INFO - PROCESS | 3252 | ++DOMWINDOW == 27 (000000E253717000) [pid = 3252] [serial = 45] [outer = 0000000000000000]
23:36:19 INFO - PROCESS | 3252 | ++DOMWINDOW == 28 (000000E254303000) [pid = 3252] [serial = 46] [outer = 000000E253717000]
23:36:19 INFO - PROCESS | 3252 | 1477636579045 Marionette DEBUG loaded listener.js
23:36:19 INFO - PROCESS | 3252 | ++DOMWINDOW == 29 (000000E254315800) [pid = 3252] [serial = 47] [outer = 000000E253717000]
23:36:19 INFO - PROCESS | 3252 | 1477636579401 Marionette TRACE conn5 <- [1,36,null,{"value":["/XMLHttpRequest/abort-during-open.htm",0,null,null,[["XMLHttpRequest: abort() during OPEN",0,null,null]]]}]
23:36:19 INFO - .
23:36:19 INFO - TEST-OK | /XMLHttpRequest/abort-during-open.htm | took 628ms
23:36:19 INFO - PROCESS | 3252 | 1477636579444 Marionette TRACE conn5 -> [0,37,"getWindowHandle",null]
23:36:19 INFO - PROCESS | 3252 | 1477636579447 Marionette TRACE conn5 <- [1,37,null,{"value":"13"}]
23:36:19 INFO - TEST-START | /XMLHttpRequest/abort-during-open.worker
23:36:19 INFO - PROCESS | 3252 | 1477636579452 Marionette TRACE conn5 -> [0,38,"executeScript",{"scriptTimeout":null,"newSandbox":true,"args":[],"filename":"executormarionette.py","script":"if (window.wrappedJSObject.win) {window.wrappedJSObject.win.close()}","sandbox":"default","line":430}]
23:36:19 INFO - PROCESS | 3252 | 1477636579553 Marionette TRACE conn5 <- [1,38,null,{"value":null}]
23:36:19 INFO - PROCESS | 3252 | 1477636579558 Marionette TRACE conn5 -> [0,39,"getWindowHandles",null]
23:36:19 INFO - PROCESS | 3252 | 1477636579561 Marionette TRACE conn5 <- [1,39,null,["13"]]
23:36:19 INFO - PROCESS | 3252 | 1477636579606 Marionette TRACE conn5 -> [0,40,"switchToWindow",{"name":"13"}]
23:36:19 INFO - PROCESS | 3252 | 1477636579610 Marionette TRACE conn5 <- [1,40,null,{}]
23:36:19 INFO - PROCESS | 3252 | 1477636579615 Marionette TRACE conn5 -> [0,41,"executeAsyncScript",{"scriptTimeout":null,"sandbox":"default","debug_script":false,"script":"/* This Source Code Form is subject to the terms of the Mozilla Public\n * License, v. 2.0. If a copy of the MPL was not distributed with this\n * file, You can obtain one at http://mozilla.org/MPL/2.0/. */\n\nwindow.wrappedJSObject.timeout_multiplier = 3;\nwindow.wrappedJSObject.explicit_timeout = 0;\n\nwindow.wrappedJSObject.addEventListener(\"message\", function listener(event) {\n if (event.data.type != \"complete\") {\n return;\n }\n window.wrappedJSObject.removeEventListener(\"message\", listener);\n clearTimeout(timer);\n var tests = event.data.tests;\n var status = event.data.status;\n\n var subtest_results = tests.map(function(x) {\n return [x.name, x.status, x.message, x.stack]\n });\n\n marionetteScriptFinished([\"/XMLHttpRequest/abort-during-open.worker\",\n status.status,\n status.message,\n status.stack,\n subtest_results]);\n}, false);\n\nwindow.wrappedJSObject.win = window.open(\"http://web-platform.test:8000/XMLHttpRequest/abort-during-open.worker\", \"9298bc64-aba3-4cf2-8943-12823d317f6b\");\n\nvar timer = null;\nif (30000) {\n timer = setTimeout(function() {\n log(\"Timeout fired\");\n window.wrappedJSObject.win.timeout();\n }, 30000);\n}\n","newSandbox":false,"line":445,"args":[],"filename":"executormarionette.py"}]
23:36:19 INFO - PROCESS | 3252 | ++DOCSHELL 000000E256F12000 == 13 [pid = 3252] [id = 17]
23:36:19 INFO - PROCESS | 3252 | ++DOMWINDOW == 30 (000000E256F12800) [pid = 3252] [serial = 48] [outer = 0000000000000000]
23:36:19 INFO - PROCESS | 3252 | ++DOMWINDOW == 31 (000000E256F17000) [pid = 3252] [serial = 49] [outer = 000000E256F12800]
23:36:19 INFO - PROCESS | 3252 | 1477636579669 Marionette DEBUG loaded listener.js
23:36:19 INFO - PROCESS | 3252 | ++DOMWINDOW == 32 (000000E25709C000) [pid = 3252] [serial = 50] [outer = 000000E256F12800]
23:36:19 INFO - PROCESS | 3252 | [3252] WARNING: Failed to retarget HTML data delivery to the parser thread.: file c:/builds/moz2_slave/fx-team-w64-d-0000000000000000/build/src/parser/html/nsHtml5StreamParser.cpp, line 970
23:36:20 INFO - PROCESS | 3252 | 1477636580037 Marionette TRACE conn5 <- [1,41,null,{"value":["/XMLHttpRequest/abort-during-open.worker",0,null,null,[["Untitled",0,{},{}]]]}]
23:36:20 INFO - .
23:36:20 INFO - TEST-OK | /XMLHttpRequest/abort-during-open.worker | took 628ms
23:36:20 INFO - PROCESS | 3252 | 1477636580082 Marionette TRACE conn5 -> [0,42,"getWindowHandle",null]
23:36:20 INFO - PROCESS | 3252 | 1477636580084 Marionette TRACE conn5 <- [1,42,null,{"value":"13"}]
23:36:20 INFO - TEST-START | /XMLHttpRequest/abort-during-unsent.htm
23:36:20 INFO - PROCESS | 3252 | 1477636580088 Marionette TRACE conn5 -> [0,43,"executeScript",{"scriptTimeout":null,"newSandbox":true,"args":[],"filename":"executormarionette.py","script":"if (window.wrappedJSObject.win) {window.wrappedJSObject.win.close()}","sandbox":"default","line":430}]
23:36:20 INFO - PROCESS | 3252 | 1477636580196 Marionette TRACE conn5 <- [1,43,null,{"value":null}]
23:36:20 INFO - PROCESS | 3252 | 1477636580202 Marionette TRACE conn5 -> [0,44,"getWindowHandles",null]
23:36:20 INFO - PROCESS | 3252 | 1477636580205 Marionette TRACE conn5 <- [1,44,null,["13"]]
23:36:20 INFO - PROCESS | 3252 | 1477636580208 Marionette TRACE conn5 -> [0,45,"switchToWindow",{"name":"13"}]
23:36:20 INFO - PROCESS | 3252 | 1477636580211 Marionette TRACE conn5 <- [1,45,null,{}]
23:36:20 INFO - PROCESS | 3252 | 1477636580216 Marionette TRACE conn5 -> [0,46,"executeAsyncScript",{"scriptTimeout":null,"sandbox":"default","debug_script":false,"script":"/* This Source Code Form is subject to the terms of the Mozilla Public\n * License, v. 2.0. If a copy of the MPL was not distributed with this\n * file, You can obtain one at http://mozilla.org/MPL/2.0/. */\n\nwindow.wrappedJSObject.timeout_multiplier = 3;\nwindow.wrappedJSObject.explicit_timeout = 0;\n\nwindow.wrappedJSObject.addEventListener(\"message\", function listener(event) {\n if (event.data.type != \"complete\") {\n return;\n }\n window.wrappedJSObject.removeEventListener(\"message\", listener);\n clearTimeout(timer);\n var tests = event.data.tests;\n var status = event.data.status;\n\n var subtest_results = tests.map(function(x) {\n return [x.name, x.status, x.message, x.stack]\n });\n\n marionetteScriptFinished([\"/XMLHttpRequest/abort-during-unsent.htm\",\n status.status,\n status.message,\n status.stack,\n subtest_results]);\n}, false);\n\nwindow.wrappedJSObject.win = window.open(\"http://web-platform.test:8000/XMLHttpRequest/abort-during-unsent.htm\", \"9298bc64-aba3-4cf2-8943-12823d317f6b\");\n\nvar timer = null;\nif (30000) {\n timer = setTimeout(function() {\n log(\"Timeout fired\");\n window.wrappedJSObject.win.timeout();\n }, 30000);\n}\n","newSandbox":false,"line":445,"args":[],"filename":"executormarionette.py"}]
23:36:20 INFO - PROCESS | 3252 | ++DOCSHELL 000000E25811E800 == 14 [pid = 3252] [id = 18]
23:36:20 INFO - PROCESS | 3252 | ++DOMWINDOW == 33 (000000E258182000) [pid = 3252] [serial = 51] [outer = 0000000000000000]
23:36:20 INFO - PROCESS | 3252 | ++DOMWINDOW == 34 (000000E258186000) [pid = 3252] [serial = 52] [outer = 000000E258182000]
23:36:20 INFO - PROCESS | 3252 | 1477636580269 Marionette DEBUG loaded listener.js
23:36:20 INFO - PROCESS | 3252 | ++DOMWINDOW == 35 (000000E258189000) [pid = 3252] [serial = 53] [outer = 000000E258182000]
23:36:20 INFO - PROCESS | 3252 | 1477636580585 Marionette TRACE conn5 <- [1,46,null,{"value":["/XMLHttpRequest/abort-during-unsent.htm",0,null,null,[["XMLHttpRequest: abort() during UNSENT",0,null,null]]]}]
23:36:20 INFO - .
23:36:20 INFO - TEST-OK | /XMLHttpRequest/abort-during-unsent.htm | took 524ms
23:36:20 INFO - PROCESS | 3252 | 1477636580615 Marionette TRACE conn5 -> [0,47,"getWindowHandle",null]
23:36:20 INFO - PROCESS | 3252 | 1477636580618 Marionette TRACE conn5 <- [1,47,null,{"value":"13"}]
23:36:20 INFO - TEST-START | /XMLHttpRequest/abort-during-upload.htm
23:36:20 INFO - PROCESS | 3252 | 1477636580622 Marionette TRACE conn5 -> [0,48,"executeScript",{"scriptTimeout":null,"newSandbox":true,"args":[],"filename":"executormarionette.py","script":"if (window.wrappedJSObject.win) {window.wrappedJSObject.win.close()}","sandbox":"default","line":430}]
23:36:20 INFO - PROCESS | 3252 | 1477636580753 Marionette TRACE conn5 <- [1,48,null,{"value":null}]
23:36:20 INFO - PROCESS | 3252 | 1477636580802 Marionette TRACE conn5 -> [0,49,"getWindowHandles",null]
23:36:20 INFO - PROCESS | 3252 | 1477636580804 Marionette TRACE conn5 <- [1,49,null,["13"]]
23:36:20 INFO - PROCESS | 3252 | 1477636580807 Marionette TRACE conn5 -> [0,50,"switchToWindow",{"name":"13"}]
23:36:20 INFO - PROCESS | 3252 | 1477636580811 Marionette TRACE conn5 <- [1,50,null,{}]
23:36:20 INFO - PROCESS | 3252 | 1477636580814 Marionette TRACE conn5 -> [0,51,"executeAsyncScript",{"scriptTimeout":null,"sandbox":"default","debug_script":false,"script":"/* This Source Code Form is subject to the terms of the Mozilla Public\n * License, v. 2.0. If a copy of the MPL was not distributed with this\n * file, You can obtain one at http://mozilla.org/MPL/2.0/. */\n\nwindow.wrappedJSObject.timeout_multiplier = 3;\nwindow.wrappedJSObject.explicit_timeout = 0;\n\nwindow.wrappedJSObject.addEventListener(\"message\", function listener(event) {\n if (event.data.type != \"complete\") {\n return;\n }\n window.wrappedJSObject.removeEventListener(\"message\", listener);\n clearTimeout(timer);\n var tests = event.data.tests;\n var status = event.data.status;\n\n var subtest_results = tests.map(function(x) {\n return [x.name, x.status, x.message, x.stack]\n });\n\n marionetteScriptFinished([\"/XMLHttpRequest/abort-during-upload.htm\",\n status.status,\n status.message,\n status.stack,\n subtest_results]);\n}, false);\n\nwindow.wrappedJSObject.win = window.open(\"http://web-platform.test:8000/XMLHttpRequest/abort-during-upload.htm\", \"9298bc64-aba3-4cf2-8943-12823d317f6b\");\n\nvar timer = null;\nif (30000) {\n timer = setTimeout(function() {\n log(\"Timeout fired\");\n window.wrappedJSObject.win.timeout();\n }, 30000);\n}\n","newSandbox":false,"line":445,"args":[],"filename":"executormarionette.py"}]
23:36:20 INFO - PROCESS | 3252 | ++DOCSHELL 000000E259E29000 == 15 [pid = 3252] [id = 19]
23:36:20 INFO - PROCESS | 3252 | ++DOMWINDOW == 36 (000000E259E29800) [pid = 3252] [serial = 54] [outer = 0000000000000000]
23:36:20 INFO - PROCESS | 3252 | ++DOMWINDOW == 37 (000000E259E32800) [pid = 3252] [serial = 55] [outer = 000000E259E29800]
23:36:20 INFO - PROCESS | 3252 | 1477636580868 Marionette DEBUG loaded listener.js
23:36:20 INFO - PROCESS | 3252 | ++DOMWINDOW == 38 (000000E25A14B000) [pid = 3252] [serial = 56] [outer = 000000E259E29800]
23:36:21 INFO - PROCESS | 3252 | 1477636581182 Marionette TRACE conn5 <- [1,51,null,{"value":["/XMLHttpRequest/abort-during-upload.htm",0,null,null,[["XMLHttpRequest: abort() while sending data",0,null,null]]]}]
23:36:21 INFO - .
23:36:21 INFO - TEST-OK | /XMLHttpRequest/abort-during-upload.htm | took 567ms
23:36:21 INFO - PROCESS | 3252 | 1477636581190 Marionette TRACE conn5 -> [0,52,"getWindowHandle",null]
23:36:21 INFO - PROCESS | 3252 | 1477636581192 Marionette TRACE conn5 <- [1,52,null,{"value":"13"}]
23:36:21 INFO - TEST-START | /XMLHttpRequest/abort-event-abort.htm
23:36:21 INFO - PROCESS | 3252 | 1477636581196 Marionette TRACE conn5 -> [0,53,"executeScript",{"scriptTimeout":null,"newSandbox":true,"args":[],"filename":"executormarionette.py","script":"if (window.wrappedJSObject.win) {window.wrappedJSObject.win.close()}","sandbox":"default","line":430}]
23:36:21 INFO - PROCESS | 3252 | 1477636581283 Marionette TRACE conn5 <- [1,53,null,{"value":null}]
23:36:21 INFO - PROCESS | 3252 | 1477636581289 Marionette TRACE conn5 -> [0,54,"getWindowHandles",null]
23:36:21 INFO - PROCESS | 3252 | 1477636581291 Marionette TRACE conn5 <- [1,54,null,["13"]]
23:36:21 INFO - PROCESS | 3252 | 1477636581295 Marionette TRACE conn5 -> [0,55,"switchToWindow",{"name":"13"}]
23:36:21 INFO - PROCESS | 3252 | 1477636581299 Marionette TRACE conn5 <- [1,55,null,{}]
23:36:21 INFO - PROCESS | 3252 | 1477636581302 Marionette TRACE conn5 -> [0,56,"executeAsyncScript",{"scriptTimeout":null,"sandbox":"default","debug_script":false,"script":"/* This Source Code Form is subject to the terms of the Mozilla Public\n * License, v. 2.0. If a copy of the MPL was not distributed with this\n * file, You can obtain one at http://mozilla.org/MPL/2.0/. */\n\nwindow.wrappedJSObject.timeout_multiplier = 3;\nwindow.wrappedJSObject.explicit_timeout = 0;\n\nwindow.wrappedJSObject.addEventListener(\"message\", function listener(event) {\n if (event.data.type != \"complete\") {\n return;\n }\n window.wrappedJSObject.removeEventListener(\"message\", listener);\n clearTimeout(timer);\n var tests = event.data.tests;\n var status = event.data.status;\n\n var subtest_results = tests.map(function(x) {\n return [x.name, x.status, x.message, x.stack]\n });\n\n marionetteScriptFinished([\"/XMLHttpRequest/abort-event-abort.htm\",\n status.status,\n status.message,\n status.stack,\n subtest_results]);\n}, false);\n\nwindow.wrappedJSObject.win = window.open(\"http://web-platform.test:8000/XMLHttpRequest/abort-event-abort.htm\", \"9298bc64-aba3-4cf2-8943-12823d317f6b\");\n\nvar timer = null;\nif (30000) {\n timer = setTimeout(function() {\n log(\"Timeout fired\");\n window.wrappedJSObject.win.timeout();\n }, 30000);\n}\n","newSandbox":false,"line":445,"args":[],"filename":"executormarionette.py"}]
23:36:21 INFO - PROCESS | 3252 | ++DOCSHELL 000000E25A9D9000 == 16 [pid = 3252] [id = 20]
23:36:21 INFO - PROCESS | 3252 | ++DOMWINDOW == 39 (000000E25A9D9800) [pid = 3252] [serial = 57] [outer = 0000000000000000]
23:36:21 INFO - PROCESS | 3252 | ++DOMWINDOW == 40 (000000E25A9DF000) [pid = 3252] [serial = 58] [outer = 000000E25A9D9800]
23:36:21 INFO - PROCESS | 3252 | 1477636581355 Marionette DEBUG loaded listener.js
23:36:21 INFO - PROCESS | 3252 | ++DOMWINDOW == 41 (000000E25ACBE000) [pid = 3252] [serial = 59] [outer = 000000E25A9D9800]
23:36:21 INFO - PROCESS | 3252 | 1477636581680 Marionette TRACE conn5 <- [1,56,null,{"value":["/XMLHttpRequest/abort-event-abort.htm",0,null,null,[["XMLHttpRequest: The abort() method: do not fire abort event in OPENED state when send() flag is unset. send() throws after abort().",0,null,null]]]}]
23:36:21 INFO - .
23:36:21 INFO - TEST-OK | /XMLHttpRequest/abort-event-abort.htm | took 524ms
23:36:21 INFO - PROCESS | 3252 | 1477636581722 Marionette TRACE conn5 -> [0,57,"getWindowHandle",null]
23:36:21 INFO - PROCESS | 3252 | 1477636581724 Marionette TRACE conn5 <- [1,57,null,{"value":"13"}]
23:36:21 INFO - TEST-START | /XMLHttpRequest/abort-event-listeners.htm
23:36:21 INFO - PROCESS | 3252 | 1477636581728 Marionette TRACE conn5 -> [0,58,"executeScript",{"scriptTimeout":null,"newSandbox":true,"args":[],"filename":"executormarionette.py","script":"if (window.wrappedJSObject.win) {window.wrappedJSObject.win.close()}","sandbox":"default","line":430}]
23:36:21 INFO - PROCESS | 3252 | 1477636581811 Marionette TRACE conn5 <- [1,58,null,{"value":null}]
23:36:21 INFO - PROCESS | 3252 | 1477636581816 Marionette TRACE conn5 -> [0,59,"getWindowHandles",null]
23:36:21 INFO - PROCESS | 3252 | 1477636581818 Marionette TRACE conn5 <- [1,59,null,["13"]]
23:36:21 INFO - PROCESS | 3252 | 1477636581821 Marionette TRACE conn5 -> [0,60,"switchToWindow",{"name":"13"}]
23:36:21 INFO - PROCESS | 3252 | 1477636581825 Marionette TRACE conn5 <- [1,60,null,{}]
23:36:21 INFO - PROCESS | 3252 | 1477636581829 Marionette TRACE conn5 -> [0,61,"executeAsyncScript",{"scriptTimeout":null,"sandbox":"default","debug_script":false,"script":"/* This Source Code Form is subject to the terms of the Mozilla Public\n * License, v. 2.0. If a copy of the MPL was not distributed with this\n * file, You can obtain one at http://mozilla.org/MPL/2.0/. */\n\nwindow.wrappedJSObject.timeout_multiplier = 3;\nwindow.wrappedJSObject.explicit_timeout = 0;\n\nwindow.wrappedJSObject.addEventListener(\"message\", function listener(event) {\n if (event.data.type != \"complete\") {\n return;\n }\n window.wrappedJSObject.removeEventListener(\"message\", listener);\n clearTimeout(timer);\n var tests = event.data.tests;\n var status = event.data.status;\n\n var subtest_results = tests.map(function(x) {\n return [x.name, x.status, x.message, x.stack]\n });\n\n marionetteScriptFinished([\"/XMLHttpRequest/abort-event-listeners.htm\",\n status.status,\n status.message,\n status.stack,\n subtest_results]);\n}, false);\n\nwindow.wrappedJSObject.win = window.open(\"http://web-platform.test:8000/XMLHttpRequest/abort-event-listeners.htm\", \"9298bc64-aba3-4cf2-8943-12823d317f6b\");\n\nvar timer = null;\nif (30000) {\n timer = setTimeout(function() {\n log(\"Timeout fired\");\n window.wrappedJSObject.win.timeout();\n }, 30000);\n}\n","newSandbox":false,"line":445,"args":[],"filename":"executormarionette.py"}]
23:36:21 INFO - PROCESS | 3252 | ++DOCSHELL 000000E25AED6800 == 17 [pid = 3252] [id = 21]
23:36:21 INFO - PROCESS | 3252 | ++DOMWINDOW == 42 (000000E25AED7000) [pid = 3252] [serial = 60] [outer = 0000000000000000]
23:36:21 INFO - PROCESS | 3252 | ++DOMWINDOW == 43 (000000E25AEDD000) [pid = 3252] [serial = 61] [outer = 000000E25AED7000]
23:36:21 INFO - PROCESS | 3252 | 1477636581883 Marionette DEBUG loaded listener.js
23:36:21 INFO - PROCESS | 3252 | ++DOMWINDOW == 44 (000000E25AEE9800) [pid = 3252] [serial = 62] [outer = 000000E25AED7000]
23:36:22 INFO - PROCESS | 3252 | 1477636582210 Marionette TRACE conn5 <- [1,61,null,{"value":["/XMLHttpRequest/abort-event-listeners.htm",0,null,null,[["XMLHttpRequest: abort() should not reset event listeners",0,null,null]]]}]
23:36:22 INFO - .
23:36:22 INFO - TEST-OK | /XMLHttpRequest/abort-event-listeners.htm | took 524ms
23:36:22 INFO - PROCESS | 3252 | 1477636582255 Marionette TRACE conn5 -> [0,62,"getWindowHandle",null]
23:36:22 INFO - PROCESS | 3252 | 1477636582258 Marionette TRACE conn5 <- [1,62,null,{"value":"13"}]
23:36:22 INFO - TEST-START | /XMLHttpRequest/abort-event-loadend.htm
23:36:22 INFO - PROCESS | 3252 | 1477636582263 Marionette TRACE conn5 -> [0,63,"executeScript",{"scriptTimeout":null,"newSandbox":true,"args":[],"filename":"executormarionette.py","script":"if (window.wrappedJSObject.win) {window.wrappedJSObject.win.close()}","sandbox":"default","line":430}]
23:36:22 INFO - PROCESS | 3252 | 1477636582369 Marionette TRACE conn5 <- [1,63,null,{"value":null}]
23:36:22 INFO - PROCESS | 3252 | 1477636582375 Marionette TRACE conn5 -> [0,64,"getWindowHandles",null]
23:36:22 INFO - PROCESS | 3252 | 1477636582377 Marionette TRACE conn5 <- [1,64,null,["13"]]
23:36:22 INFO - PROCESS | 3252 | 1477636582381 Marionette TRACE conn5 -> [0,65,"switchToWindow",{"name":"13"}]
23:36:22 INFO - PROCESS | 3252 | 1477636582385 Marionette TRACE conn5 <- [1,65,null,{}]
23:36:22 INFO - PROCESS | 3252 | 1477636582388 Marionette TRACE conn5 -> [0,66,"executeAsyncScript",{"scriptTimeout":null,"sandbox":"default","debug_script":false,"script":"/* This Source Code Form is subject to the terms of the Mozilla Public\n * License, v. 2.0. If a copy of the MPL was not distributed with this\n * file, You can obtain one at http://mozilla.org/MPL/2.0/. */\n\nwindow.wrappedJSObject.timeout_multiplier = 3;\nwindow.wrappedJSObject.explicit_timeout = 0;\n\nwindow.wrappedJSObject.addEventListener(\"message\", function listener(event) {\n if (event.data.type != \"complete\") {\n return;\n }\n window.wrappedJSObject.removeEventListener(\"message\", listener);\n clearTimeout(timer);\n var tests = event.data.tests;\n var status = event.data.status;\n\n var subtest_results = tests.map(function(x) {\n return [x.name, x.status, x.message, x.stack]\n });\n\n marionetteScriptFinished([\"/XMLHttpRequest/abort-event-loadend.htm\",\n status.status,\n status.message,\n status.stack,\n subtest_results]);\n}, false);\n\nwindow.wrappedJSObject.win = window.open(\"http://web-platform.test:8000/XMLHttpRequest/abort-event-loadend.htm\", \"9298bc64-aba3-4cf2-8943-12823d317f6b\");\n\nvar timer = null;\nif (30000) {\n timer = setTimeout(function() {\n log(\"Timeout fired\");\n window.wrappedJSObject.win.timeout();\n }, 30000);\n}\n","newSandbox":false,"line":445,"args":[],"filename":"executormarionette.py"}]
23:36:22 INFO - PROCESS | 3252 | ++DOCSHELL 000000E25B13B800 == 18 [pid = 3252] [id = 22]
23:36:22 INFO - PROCESS | 3252 | ++DOMWINDOW == 45 (000000E25B13C000) [pid = 3252] [serial = 63] [outer = 0000000000000000]
23:36:22 INFO - PROCESS | 3252 | ++DOMWINDOW == 46 (000000E25B14D000) [pid = 3252] [serial = 64] [outer = 000000E25B13C000]
23:36:22 INFO - PROCESS | 3252 | 1477636582442 Marionette DEBUG loaded listener.js
23:36:22 INFO - PROCESS | 3252 | ++DOMWINDOW == 47 (000000E25B38B800) [pid = 3252] [serial = 65] [outer = 000000E25B13C000]
23:36:22 INFO - PROCESS | 3252 | 1477636582751 Marionette TRACE conn5 <- [1,66,null,{"value":["/XMLHttpRequest/abort-event-loadend.htm",0,null,null,[["XMLHttpRequest: The abort() method: Fire a progress event named loadend",0,null,null]]]}]
23:36:22 INFO - .
23:36:22 INFO - TEST-OK | /XMLHttpRequest/abort-event-loadend.htm | took 522ms
23:36:22 INFO - PROCESS | 3252 | 1477636582787 Marionette TRACE conn5 -> [0,67,"getWindowHandle",null]
23:36:22 INFO - TEST-START | /XMLHttpRequest/abort-event-order.htm
23:36:22 INFO - PROCESS | 3252 | 1477636582789 Marionette TRACE conn5 <- [1,67,null,{"value":"13"}]
23:36:22 INFO - PROCESS | 3252 | 1477636582793 Marionette TRACE conn5 -> [0,68,"executeScript",{"scriptTimeout":null,"newSandbox":true,"args":[],"filename":"executormarionette.py","script":"if (window.wrappedJSObject.win) {window.wrappedJSObject.win.close()}","sandbox":"default","line":430}]
23:36:22 INFO - PROCESS | 3252 | 1477636582877 Marionette TRACE conn5 <- [1,68,null,{"value":null}]
23:36:22 INFO - PROCESS | 3252 | 1477636582882 Marionette TRACE conn5 -> [0,69,"getWindowHandles",null]
23:36:22 INFO - PROCESS | 3252 | 1477636582884 Marionette TRACE conn5 <- [1,69,null,["13"]]
23:36:22 INFO - PROCESS | 3252 | 1477636582887 Marionette TRACE conn5 -> [0,70,"switchToWindow",{"name":"13"}]
23:36:22 INFO - PROCESS | 3252 | 1477636582891 Marionette TRACE conn5 <- [1,70,null,{}]
23:36:22 INFO - PROCESS | 3252 | 1477636582932 Marionette TRACE conn5 -> [0,71,"executeAsyncScript",{"scriptTimeout":null,"sandbox":"default","debug_script":false,"script":"/* This Source Code Form is subject to the terms of the Mozilla Public\n * License, v. 2.0. If a copy of the MPL was not distributed with this\n * file, You can obtain one at http://mozilla.org/MPL/2.0/. */\n\nwindow.wrappedJSObject.timeout_multiplier = 3;\nwindow.wrappedJSObject.explicit_timeout = 0;\n\nwindow.wrappedJSObject.addEventListener(\"message\", function listener(event) {\n if (event.data.type != \"complete\") {\n return;\n }\n window.wrappedJSObject.removeEventListener(\"message\", listener);\n clearTimeout(timer);\n var tests = event.data.tests;\n var status = event.data.status;\n\n var subtest_results = tests.map(function(x) {\n return [x.name, x.status, x.message, x.stack]\n });\n\n marionetteScriptFinished([\"/XMLHttpRequest/abort-event-order.htm\",\n status.status,\n status.message,\n status.stack,\n subtest_results]);\n}, false);\n\nwindow.wrappedJSObject.win = window.open(\"http://web-platform.test:8000/XMLHttpRequest/abort-event-order.htm\", \"9298bc64-aba3-4cf2-8943-12823d317f6b\");\n\nvar timer = null;\nif (30000) {\n timer = setTimeout(function() {\n log(\"Timeout fired\");\n window.wrappedJSObject.win.timeout();\n }, 30000);\n}\n","newSandbox":false,"line":445,"args":[],"filename":"executormarionette.py"}]
23:36:23 INFO - PROCESS | 3252 | ++DOCSHELL 000000E25B832800 == 19 [pid = 3252] [id = 23]
23:36:23 INFO - PROCESS | 3252 | ++DOMWINDOW == 48 (000000E25B84B000) [pid = 3252] [serial = 66] [outer = 0000000000000000]
23:36:23 INFO - PROCESS | 3252 | ++DOMWINDOW == 49 (000000E25BB9A800) [pid = 3252] [serial = 67] [outer = 000000E25B84B000]
23:36:23 INFO - PROCESS | 3252 | 1477636583030 Marionette DEBUG loaded listener.js
23:36:23 INFO - PROCESS | 3252 | ++DOMWINDOW == 50 (000000E25BDCD000) [pid = 3252] [serial = 68] [outer = 000000E25B84B000]
23:36:23 INFO - PROCESS | 3252 | 1477636583324 Marionette TRACE conn5 <- [1,71,null,{"value":["/XMLHttpRequest/abort-event-order.htm",0,null,null,[["XMLHttpRequest: The abort() method: abort and loadend events",0,null,null]]]}]
23:36:23 INFO - .
23:36:23 INFO - TEST-OK | /XMLHttpRequest/abort-event-order.htm | took 587ms
23:36:23 INFO - PROCESS | 3252 | 1477636583383 Marionette TRACE conn5 -> [0,72,"getWindowHandle",null]
23:36:23 INFO - PROCESS | 3252 | 1477636583385 Marionette TRACE conn5 <- [1,72,null,{"value":"13"}]
23:36:23 INFO - TEST-START | /XMLHttpRequest/abort-upload-event-abort.htm
23:36:23 INFO - PROCESS | 3252 | 1477636583390 Marionette TRACE conn5 -> [0,73,"executeScript",{"scriptTimeout":null,"newSandbox":true,"args":[],"filename":"executormarionette.py","script":"if (window.wrappedJSObject.win) {window.wrappedJSObject.win.close()}","sandbox":"default","line":430}]
23:36:23 INFO - PROCESS | 3252 | 1477636583490 Marionette TRACE conn5 <- [1,73,null,{"value":null}]
23:36:23 INFO - PROCESS | 3252 | 1477636583496 Marionette TRACE conn5 -> [0,74,"getWindowHandles",null]
23:36:23 INFO - PROCESS | 3252 | 1477636583498 Marionette TRACE conn5 <- [1,74,null,["13"]]
23:36:23 INFO - PROCESS | 3252 | 1477636583501 Marionette TRACE conn5 -> [0,75,"switchToWindow",{"name":"13"}]
23:36:23 INFO - PROCESS | 3252 | 1477636583506 Marionette TRACE conn5 <- [1,75,null,{}]
23:36:23 INFO - PROCESS | 3252 | 1477636583509 Marionette TRACE conn5 -> [0,76,"executeAsyncScript",{"scriptTimeout":null,"sandbox":"default","debug_script":false,"script":"/* This Source Code Form is subject to the terms of the Mozilla Public\n * License, v. 2.0. If a copy of the MPL was not distributed with this\n * file, You can obtain one at http://mozilla.org/MPL/2.0/. */\n\nwindow.wrappedJSObject.timeout_multiplier = 3;\nwindow.wrappedJSObject.explicit_timeout = 0;\n\nwindow.wrappedJSObject.addEventListener(\"message\", function listener(event) {\n if (event.data.type != \"complete\") {\n return;\n }\n window.wrappedJSObject.removeEventListener(\"message\", listener);\n clearTimeout(timer);\n var tests = event.data.tests;\n var status = event.data.status;\n\n var subtest_results = tests.map(function(x) {\n return [x.name, x.status, x.message, x.stack]\n });\n\n marionetteScriptFinished([\"/XMLHttpRequest/abort-upload-event-abort.htm\",\n status.status,\n status.message,\n status.stack,\n subtest_results]);\n}, false);\n\nwindow.wrappedJSObject.win = window.open(\"http://web-platform.test:8000/XMLHttpRequest/abort-upload-event-abort.htm\", \"9298bc64-aba3-4cf2-8943-12823d317f6b\");\n\nvar timer = null;\nif (30000) {\n timer = setTimeout(function() {\n log(\"Timeout fired\");\n window.wrappedJSObject.win.timeout();\n }, 30000);\n}\n","newSandbox":false,"line":445,"args":[],"filename":"executormarionette.py"}]
23:36:23 INFO - PROCESS | 3252 | ++DOCSHELL 000000E25D871000 == 20 [pid = 3252] [id = 24]
23:36:23 INFO - PROCESS | 3252 | ++DOMWINDOW == 51 (000000E25D871800) [pid = 3252] [serial = 69] [outer = 0000000000000000]
23:36:23 INFO - PROCESS | 3252 | ++DOMWINDOW == 52 (000000E25DD1E800) [pid = 3252] [serial = 70] [outer = 000000E25D871800]
23:36:23 INFO - PROCESS | 3252 | 1477636583571 Marionette DEBUG loaded listener.js
23:36:23 INFO - PROCESS | 3252 | ++DOMWINDOW == 53 (000000E25DE0E000) [pid = 3252] [serial = 71] [outer = 000000E25D871800]
23:36:23 INFO - PROCESS | 3252 | 1477636583938 Marionette TRACE conn5 <- [1,76,null,{"value":["/XMLHttpRequest/abort-upload-event-abort.htm",0,null,null,[["XMLHttpRequest: The abort() method: Fire a progress event named abort on the XMLHttpRequestUpload object",0,null,null]]]}]
23:36:23 INFO - .
23:36:23 INFO - TEST-OK | /XMLHttpRequest/abort-upload-event-abort.htm | took 586ms
23:36:23 INFO - PROCESS | 3252 | 1477636583977 Marionette TRACE conn5 -> [0,77,"getWindowHandle",null]
23:36:23 INFO - PROCESS | 3252 | 1477636583979 Marionette TRACE conn5 <- [1,77,null,{"value":"13"}]
23:36:23 INFO - TEST-START | /XMLHttpRequest/abort-upload-event-loadend.htm
23:36:23 INFO - PROCESS | 3252 | 1477636583983 Marionette TRACE conn5 -> [0,78,"executeScript",{"scriptTimeout":null,"newSandbox":true,"args":[],"filename":"executormarionette.py","script":"if (window.wrappedJSObject.win) {window.wrappedJSObject.win.close()}","sandbox":"default","line":430}]
23:36:24 INFO - PROCESS | 3252 | 1477636584094 Marionette TRACE conn5 <- [1,78,null,{"value":null}]
23:36:24 INFO - PROCESS | 3252 | 1477636584100 Marionette TRACE conn5 -> [0,79,"getWindowHandles",null]
23:36:24 INFO - PROCESS | 3252 | 1477636584102 Marionette TRACE conn5 <- [1,79,null,["13"]]
23:36:24 INFO - PROCESS | 3252 | 1477636584105 Marionette TRACE conn5 -> [0,80,"switchToWindow",{"name":"13"}]
23:36:24 INFO - PROCESS | 3252 | 1477636584108 Marionette TRACE conn5 <- [1,80,null,{}]
23:36:24 INFO - PROCESS | 3252 | 1477636584112 Marionette TRACE conn5 -> [0,81,"executeAsyncScript",{"scriptTimeout":null,"sandbox":"default","debug_script":false,"script":"/* This Source Code Form is subject to the terms of the Mozilla Public\n * License, v. 2.0. If a copy of the MPL was not distributed with this\n * file, You can obtain one at http://mozilla.org/MPL/2.0/. */\n\nwindow.wrappedJSObject.timeout_multiplier = 3;\nwindow.wrappedJSObject.explicit_timeout = 0;\n\nwindow.wrappedJSObject.addEventListener(\"message\", function listener(event) {\n if (event.data.type != \"complete\") {\n return;\n }\n window.wrappedJSObject.removeEventListener(\"message\", listener);\n clearTimeout(timer);\n var tests = event.data.tests;\n var status = event.data.status;\n\n var subtest_results = tests.map(function(x) {\n return [x.name, x.status, x.message, x.stack]\n });\n\n marionetteScriptFinished([\"/XMLHttpRequest/abort-upload-event-loadend.htm\",\n status.status,\n status.message,\n status.stack,\n subtest_results]);\n}, false);\n\nwindow.wrappedJSObject.win = window.open(\"http://web-platform.test:8000/XMLHttpRequest/abort-upload-event-loadend.htm\", \"9298bc64-aba3-4cf2-8943-12823d317f6b\");\n\nvar timer = null;\nif (30000) {\n timer = setTimeout(function() {\n log(\"Timeout fired\");\n window.wrappedJSObject.win.timeout();\n }, 30000);\n}\n","newSandbox":false,"line":445,"args":[],"filename":"executormarionette.py"}]
23:36:24 INFO - PROCESS | 3252 | ++DOCSHELL 000000E25E179000 == 21 [pid = 3252] [id = 25]
23:36:24 INFO - PROCESS | 3252 | ++DOMWINDOW == 54 (000000E25E17A000) [pid = 3252] [serial = 72] [outer = 0000000000000000]
23:36:24 INFO - PROCESS | 3252 | ++DOMWINDOW == 55 (000000E25E17E800) [pid = 3252] [serial = 73] [outer = 000000E25E17A000]
23:36:24 INFO - PROCESS | 3252 | 1477636584166 Marionette DEBUG loaded listener.js
23:36:24 INFO - PROCESS | 3252 | ++DOMWINDOW == 56 (000000E25F57E800) [pid = 3252] [serial = 74] [outer = 000000E25E17A000]
23:36:24 INFO - PROCESS | 3252 | 1477636584467 Marionette TRACE conn5 <- [1,81,null,{"value":["/XMLHttpRequest/abort-upload-event-loadend.htm",0,null,null,[["XMLHttpRequest: The abort() method: Fire a progress event named loadend on the XMLHttpRequestUpload object",0,null,null]]]}]
23:36:24 INFO - .
23:36:24 INFO - TEST-OK | /XMLHttpRequest/abort-upload-event-loadend.htm | took 524ms
23:36:24 INFO - PROCESS | 3252 | 1477636584509 Marionette TRACE conn5 -> [0,82,"getWindowHandle",null]
23:36:24 INFO - PROCESS | 3252 | 1477636584511 Marionette TRACE conn5 <- [1,82,null,{"value":"13"}]
23:36:24 INFO - TEST-START | /XMLHttpRequest/anonymous-mode-unsupported.htm
23:36:24 INFO - PROCESS | 3252 | 1477636584515 Marionette TRACE conn5 -> [0,83,"executeScript",{"scriptTimeout":null,"newSandbox":true,"args":[],"filename":"executormarionette.py","script":"if (window.wrappedJSObject.win) {window.wrappedJSObject.win.close()}","sandbox":"default","line":430}]
23:36:24 INFO - PROCESS | 3252 | 1477636584601 Marionette TRACE conn5 <- [1,83,null,{"value":null}]
23:36:24 INFO - PROCESS | 3252 | 1477636584606 Marionette TRACE conn5 -> [0,84,"getWindowHandles",null]
23:36:24 INFO - PROCESS | 3252 | 1477636584608 Marionette TRACE conn5 <- [1,84,null,["13"]]
23:36:24 INFO - PROCESS | 3252 | 1477636584612 Marionette TRACE conn5 -> [0,85,"switchToWindow",{"name":"13"}]
23:36:24 INFO - PROCESS | 3252 | 1477636584616 Marionette TRACE conn5 <- [1,85,null,{}]
23:36:24 INFO - PROCESS | 3252 | 1477636584619 Marionette TRACE conn5 -> [0,86,"executeAsyncScript",{"scriptTimeout":null,"sandbox":"default","debug_script":false,"script":"/* This Source Code Form is subject to the terms of the Mozilla Public\n * License, v. 2.0. If a copy of the MPL was not distributed with this\n * file, You can obtain one at http://mozilla.org/MPL/2.0/. */\n\nwindow.wrappedJSObject.timeout_multiplier = 3;\nwindow.wrappedJSObject.explicit_timeout = 0;\n\nwindow.wrappedJSObject.addEventListener(\"message\", function listener(event) {\n if (event.data.type != \"complete\") {\n return;\n }\n window.wrappedJSObject.removeEventListener(\"message\", listener);\n clearTimeout(timer);\n var tests = event.data.tests;\n var status = event.data.status;\n\n var subtest_results = tests.map(function(x) {\n return [x.name, x.status, x.message, x.stack]\n });\n\n marionetteScriptFinished([\"/XMLHttpRequest/anonymous-mode-unsupported.htm\",\n status.status,\n status.message,\n status.stack,\n subtest_results]);\n}, false);\n\nwindow.wrappedJSObject.win = window.open(\"http://web-platform.test:8000/XMLHttpRequest/anonymous-mode-unsupported.htm\", \"9298bc64-aba3-4cf2-8943-12823d317f6b\");\n\nvar timer = null;\nif (30000) {\n timer = setTimeout(function() {\n log(\"Timeout fired\");\n window.wrappedJSObject.win.timeout();\n }, 30000);\n}\n","newSandbox":false,"line":445,"args":[],"filename":"executormarionette.py"}]
23:36:24 INFO - PROCESS | 3252 | ++DOCSHELL 000000E25F59B000 == 22 [pid = 3252] [id = 26]
23:36:24 INFO - PROCESS | 3252 | ++DOMWINDOW == 57 (000000E25F59C800) [pid = 3252] [serial = 75] [outer = 0000000000000000]
23:36:24 INFO - PROCESS | 3252 | ++DOMWINDOW == 58 (000000E25F9E1000) [pid = 3252] [serial = 76] [outer = 000000E25F59C800]
23:36:24 INFO - PROCESS | 3252 | 1477636584716 Marionette DEBUG loaded listener.js
23:36:24 INFO - PROCESS | 3252 | ++DOMWINDOW == 59 (000000E260268000) [pid = 3252] [serial = 77] [outer = 000000E25F59C800]
23:36:25 INFO - PROCESS | 3252 | 1477636584993 Marionette TRACE conn5 <- [1,86,null,{"value":["/XMLHttpRequest/anonymous-mode-unsupported.htm",0,null,null,[["XMLHttpRequest: anonymous mode unsupported",0,null,null]]]}]
23:36:25 INFO - .
23:36:25 INFO - TEST-OK | /XMLHttpRequest/anonymous-mode-unsupported.htm | took 523ms
23:36:25 INFO - PROCESS | 3252 | 1477636585042 Marionette TRACE conn5 -> [0,87,"getWindowHandle",null]
23:36:25 INFO - PROCESS | 3252 | 1477636585044 Marionette TRACE conn5 <- [1,87,null,{"value":"13"}]
23:36:25 INFO - TEST-START | /XMLHttpRequest/data-uri.htm
23:36:25 INFO - PROCESS | 3252 | 1477636585049 Marionette TRACE conn5 -> [0,88,"executeScript",{"scriptTimeout":null,"newSandbox":true,"args":[],"filename":"executormarionette.py","script":"if (window.wrappedJSObject.win) {window.wrappedJSObject.win.close()}","sandbox":"default","line":430}]
23:36:25 INFO - PROCESS | 3252 | 1477636585132 Marionette TRACE conn5 <- [1,88,null,{"value":null}]
23:36:25 INFO - PROCESS | 3252 | 1477636585137 Marionette TRACE conn5 -> [0,89,"getWindowHandles",null]
23:36:25 INFO - PROCESS | 3252 | 1477636585139 Marionette TRACE conn5 <- [1,89,null,["13"]]
23:36:25 INFO - PROCESS | 3252 | 1477636585142 Marionette TRACE conn5 -> [0,90,"switchToWindow",{"name":"13"}]
23:36:25 INFO - PROCESS | 3252 | 1477636585146 Marionette TRACE conn5 <- [1,90,null,{}]
23:36:25 INFO - PROCESS | 3252 | 1477636585150 Marionette TRACE conn5 -> [0,91,"executeAsyncScript",{"scriptTimeout":null,"sandbox":"default","debug_script":false,"script":"/* This Source Code Form is subject to the terms of the Mozilla Public\n * License, v. 2.0. If a copy of the MPL was not distributed with this\n * file, You can obtain one at http://mozilla.org/MPL/2.0/. */\n\nwindow.wrappedJSObject.timeout_multiplier = 3;\nwindow.wrappedJSObject.explicit_timeout = 0;\n\nwindow.wrappedJSObject.addEventListener(\"message\", function listener(event) {\n if (event.data.type != \"complete\") {\n return;\n }\n window.wrappedJSObject.removeEventListener(\"message\", listener);\n clearTimeout(timer);\n var tests = event.data.tests;\n var status = event.data.status;\n\n var subtest_results = tests.map(function(x) {\n return [x.name, x.status, x.message, x.stack]\n });\n\n marionetteScriptFinished([\"/XMLHttpRequest/data-uri.htm\",\n status.status,\n status.message,\n status.stack,\n subtest_results]);\n}, false);\n\nwindow.wrappedJSObject.win = window.open(\"http://web-platform.test:8000/XMLHttpRequest/data-uri.htm\", \"9298bc64-aba3-4cf2-8943-12823d317f6b\");\n\nvar timer = null;\nif (30000) {\n timer = setTimeout(function() {\n log(\"Timeout fired\");\n window.wrappedJSObject.win.timeout();\n }, 30000);\n}\n","newSandbox":false,"line":445,"args":[],"filename":"executormarionette.py"}]
23:36:25 INFO - PROCESS | 3252 | ++DOCSHELL 000000E258172000 == 23 [pid = 3252] [id = 27]
23:36:25 INFO - PROCESS | 3252 | ++DOMWINDOW == 60 (000000E258174000) [pid = 3252] [serial = 78] [outer = 0000000000000000]
23:36:25 INFO - PROCESS | 3252 | ++DOMWINDOW == 61 (000000E2604C4000) [pid = 3252] [serial = 79] [outer = 000000E258174000]
23:36:25 INFO - PROCESS | 3252 | 1477636585203 Marionette DEBUG loaded listener.js
23:36:25 INFO - PROCESS | 3252 | ++DOMWINDOW == 62 (000000E2604D2800) [pid = 3252] [serial = 80] [outer = 000000E258174000]
23:36:25 INFO - PROCESS | 3252 | 1477636585682 Marionette TRACE conn5 <- [1,91,null,{"value":["/XMLHttpRequest/data-uri.htm",0,null,null,[["XHR method GET with charset text/plain",0,null,null],["XHR method GET with charset text/plain (base64)",0,null,null],["XHR method GET with charset text/html",0,null,null],["XHR method GET with charset text/html;charset=UTF-8",0,null,null],["XHR method GET with charset image/png",1,"assert_equals: expected \"Hello, World!\" but got \"Hello,World!\"","do_test/ [0,92,"getWindowHandle",null]
23:36:25 INFO - PROCESS | 3252 | 1477636585733 Marionette TRACE conn5 <- [1,92,null,{"value":"13"}]
23:36:25 INFO - TEST-START | /XMLHttpRequest/event-abort.htm
23:36:25 INFO - PROCESS | 3252 | 1477636585741 Marionette TRACE conn5 -> [0,93,"executeScript",{"scriptTimeout":null,"newSandbox":true,"args":[],"filename":"executormarionette.py","script":"if (window.wrappedJSObject.win) {window.wrappedJSObject.win.close()}","sandbox":"default","line":430}]
23:36:25 INFO - PROCESS | 3252 | 1477636585924 Marionette TRACE conn5 <- [1,93,null,{"value":null}]
23:36:26 INFO - PROCESS | 3252 | 1477636585999 Marionette TRACE conn5 -> [0,94,"getWindowHandles",null]
23:36:26 INFO - PROCESS | 3252 | 1477636586004 Marionette TRACE conn5 <- [1,94,null,["13"]]
23:36:26 INFO - PROCESS | 3252 | 1477636586009 Marionette TRACE conn5 -> [0,95,"switchToWindow",{"name":"13"}]
23:36:26 INFO - PROCESS | 3252 | 1477636586014 Marionette TRACE conn5 <- [1,95,null,{}]
23:36:26 INFO - PROCESS | 3252 | 1477636586022 Marionette TRACE conn5 -> [0,96,"executeAsyncScript",{"scriptTimeout":null,"sandbox":"default","debug_script":false,"script":"/* This Source Code Form is subject to the terms of the Mozilla Public\n * License, v. 2.0. If a copy of the MPL was not distributed with this\n * file, You can obtain one at http://mozilla.org/MPL/2.0/. */\n\nwindow.wrappedJSObject.timeout_multiplier = 3;\nwindow.wrappedJSObject.explicit_timeout = 0;\n\nwindow.wrappedJSObject.addEventListener(\"message\", function listener(event) {\n if (event.data.type != \"complete\") {\n return;\n }\n window.wrappedJSObject.removeEventListener(\"message\", listener);\n clearTimeout(timer);\n var tests = event.data.tests;\n var status = event.data.status;\n\n var subtest_results = tests.map(function(x) {\n return [x.name, x.status, x.message, x.stack]\n });\n\n marionetteScriptFinished([\"/XMLHttpRequest/event-abort.htm\",\n status.status,\n status.message,\n status.stack,\n subtest_results]);\n}, false);\n\nwindow.wrappedJSObject.win = window.open(\"http://web-platform.test:8000/XMLHttpRequest/event-abort.htm\", \"9298bc64-aba3-4cf2-8943-12823d317f6b\");\n\nvar timer = null;\nif (30000) {\n timer = setTimeout(function() {\n log(\"Timeout fired\");\n window.wrappedJSObject.win.timeout();\n }, 30000);\n}\n","newSandbox":false,"line":445,"args":[],"filename":"executormarionette.py"}]
23:36:26 INFO - PROCESS | 3252 | ++DOCSHELL 000000E253694800 == 24 [pid = 3252] [id = 28]
23:36:26 INFO - PROCESS | 3252 | ++DOMWINDOW == 63 (000000E253695800) [pid = 3252] [serial = 81] [outer = 0000000000000000]
23:36:26 INFO - PROCESS | 3252 | ++DOMWINDOW == 64 (000000E2536A2000) [pid = 3252] [serial = 82] [outer = 000000E253695800]
23:36:26 INFO - PROCESS | 3252 | 1477636586096 Marionette DEBUG loaded listener.js
23:36:26 INFO - PROCESS | 3252 | ++DOMWINDOW == 65 (000000E254517000) [pid = 3252] [serial = 83] [outer = 000000E253695800]
23:36:26 INFO - PROCESS | 3252 | 1477636586500 Marionette TRACE conn5 <- [1,96,null,{"value":["/XMLHttpRequest/event-abort.htm",0,null,null,[["XMLHttpRequest: abort event",0,null,null]]]}]
23:36:26 INFO - .
23:36:26 INFO - TEST-OK | /XMLHttpRequest/event-abort.htm | took 776ms
23:36:26 INFO - PROCESS | 3252 | 1477636586518 Marionette TRACE conn5 -> [0,97,"getWindowHandle",null]
23:36:26 INFO - PROCESS | 3252 | 1477636586522 Marionette TRACE conn5 <- [1,97,null,{"value":"13"}]
23:36:26 INFO - TEST-START | /XMLHttpRequest/event-error-order.sub.html
23:36:26 INFO - PROCESS | 3252 | 1477636586527 Marionette TRACE conn5 -> [0,98,"executeScript",{"scriptTimeout":null,"newSandbox":true,"args":[],"filename":"executormarionette.py","script":"if (window.wrappedJSObject.win) {window.wrappedJSObject.win.close()}","sandbox":"default","line":430}]
23:36:26 INFO - PROCESS | 3252 | 1477636586651 Marionette TRACE conn5 <- [1,98,null,{"value":null}]
23:36:26 INFO - PROCESS | 3252 | 1477636586705 Marionette TRACE conn5 -> [0,99,"getWindowHandles",null]
23:36:26 INFO - PROCESS | 3252 | 1477636586708 Marionette TRACE conn5 <- [1,99,null,["13"]]
23:36:26 INFO - PROCESS | 3252 | 1477636586712 Marionette TRACE conn5 -> [0,100,"switchToWindow",{"name":"13"}]
23:36:26 INFO - PROCESS | 3252 | 1477636586717 Marionette TRACE conn5 <- [1,100,null,{}]
23:36:26 INFO - PROCESS | 3252 | 1477636586721 Marionette TRACE conn5 -> [0,101,"executeAsyncScript",{"scriptTimeout":null,"sandbox":"default","debug_script":false,"script":"/* This Source Code Form is subject to the terms of the Mozilla Public\n * License, v. 2.0. If a copy of the MPL was not distributed with this\n * file, You can obtain one at http://mozilla.org/MPL/2.0/. */\n\nwindow.wrappedJSObject.timeout_multiplier = 3;\nwindow.wrappedJSObject.explicit_timeout = 0;\n\nwindow.wrappedJSObject.addEventListener(\"message\", function listener(event) {\n if (event.data.type != \"complete\") {\n return;\n }\n window.wrappedJSObject.removeEventListener(\"message\", listener);\n clearTimeout(timer);\n var tests = event.data.tests;\n var status = event.data.status;\n\n var subtest_results = tests.map(function(x) {\n return [x.name, x.status, x.message, x.stack]\n });\n\n marionetteScriptFinished([\"/XMLHttpRequest/event-error-order.sub.html\",\n status.status,\n status.message,\n status.stack,\n subtest_results]);\n}, false);\n\nwindow.wrappedJSObject.win = window.open(\"http://web-platform.test:8000/XMLHttpRequest/event-error-order.sub.html\", \"9298bc64-aba3-4cf2-8943-12823d317f6b\");\n\nvar timer = null;\nif (30000) {\n timer = setTimeout(function() {\n log(\"Timeout fired\");\n window.wrappedJSObject.win.timeout();\n }, 30000);\n}\n","newSandbox":false,"line":445,"args":[],"filename":"executormarionette.py"}]
23:36:26 INFO - PROCESS | 3252 | ++DOCSHELL 000000E25A2D6000 == 25 [pid = 3252] [id = 29]
23:36:26 INFO - PROCESS | 3252 | ++DOMWINDOW == 66 (000000E25A2D6800) [pid = 3252] [serial = 84] [outer = 0000000000000000]
23:36:26 INFO - PROCESS | 3252 | ++DOMWINDOW == 67 (000000E25A9CB000) [pid = 3252] [serial = 85] [outer = 000000E25A2D6800]
23:36:26 INFO - PROCESS | 3252 | 1477636586788 Marionette DEBUG loaded listener.js
23:36:26 INFO - PROCESS | 3252 | ++DOMWINDOW == 68 (000000E25A9CF000) [pid = 3252] [serial = 86] [outer = 000000E25A2D6800]
23:36:27 INFO - PROCESS | 3252 | [3252] WARNING: NS_ENSURE_SUCCESS(status, status) failed with result 0x804B001E: file c:/builds/moz2_slave/fx-team-w64-d-0000000000000000/build/src/netwerk/protocol/http/nsCORSListenerProxy.cpp, line 553
23:36:27 INFO - PROCESS | 3252 | [3252] WARNING: NS_ENSURE_SUCCESS(status, status) failed with result 0x805303F4: file c:/builds/moz2_slave/fx-team-w64-d-0000000000000000/build/src/netwerk/protocol/http/nsCORSListenerProxy.cpp, line 1293
23:36:27 INFO - PROCESS | 3252 | [3252] WARNING: NS_ENSURE_SUCCESS(status, status) failed with result 0x805303F4: file c:/builds/moz2_slave/fx-team-w64-d-0000000000000000/build/src/netwerk/protocol/http/nsCORSListenerProxy.cpp, line 553
23:36:27 INFO - PROCESS | 3252 | 1477636587233 Marionette TRACE conn5 <- [1,101,null,{"value":["/XMLHttpRequest/event-error-order.sub.html",0,null,null,[["XMLHttpRequest: event - error (order of events)",0,null,null]]]}]
23:36:27 INFO - .
23:36:27 INFO - TEST-OK | /XMLHttpRequest/event-error-order.sub.html | took 735ms
23:36:27 INFO - PROCESS | 3252 | 1477636587272 Marionette TRACE conn5 -> [0,102,"getWindowHandle",null]
23:36:27 INFO - PROCESS | 3252 | 1477636587278 Marionette TRACE conn5 <- [1,102,null,{"value":"13"}]
23:36:27 INFO - TEST-START | /XMLHttpRequest/event-error.sub.html
23:36:27 INFO - PROCESS | 3252 | 1477636587283 Marionette TRACE conn5 -> [0,103,"executeScript",{"scriptTimeout":null,"newSandbox":true,"args":[],"filename":"executormarionette.py","script":"if (window.wrappedJSObject.win) {window.wrappedJSObject.win.close()}","sandbox":"default","line":430}]
23:36:27 INFO - PROCESS | 3252 | 1477636587399 Marionette TRACE conn5 <- [1,103,null,{"value":null}]
23:36:27 INFO - PROCESS | 3252 | 1477636587454 Marionette TRACE conn5 -> [0,104,"getWindowHandles",null]
23:36:27 INFO - PROCESS | 3252 | 1477636587458 Marionette TRACE conn5 <- [1,104,null,["13"]]
23:36:27 INFO - PROCESS | 3252 | 1477636587461 Marionette TRACE conn5 -> [0,105,"switchToWindow",{"name":"13"}]
23:36:27 INFO - PROCESS | 3252 | 1477636587467 Marionette TRACE conn5 <- [1,105,null,{}]
23:36:27 INFO - PROCESS | 3252 | 1477636587471 Marionette TRACE conn5 -> [0,106,"executeAsyncScript",{"scriptTimeout":null,"sandbox":"default","debug_script":false,"script":"/* This Source Code Form is subject to the terms of the Mozilla Public\n * License, v. 2.0. If a copy of the MPL was not distributed with this\n * file, You can obtain one at http://mozilla.org/MPL/2.0/. */\n\nwindow.wrappedJSObject.timeout_multiplier = 3;\nwindow.wrappedJSObject.explicit_timeout = 0;\n\nwindow.wrappedJSObject.addEventListener(\"message\", function listener(event) {\n if (event.data.type != \"complete\") {\n return;\n }\n window.wrappedJSObject.removeEventListener(\"message\", listener);\n clearTimeout(timer);\n var tests = event.data.tests;\n var status = event.data.status;\n\n var subtest_results = tests.map(function(x) {\n return [x.name, x.status, x.message, x.stack]\n });\n\n marionetteScriptFinished([\"/XMLHttpRequest/event-error.sub.html\",\n status.status,\n status.message,\n status.stack,\n subtest_results]);\n}, false);\n\nwindow.wrappedJSObject.win = window.open(\"http://web-platform.test:8000/XMLHttpRequest/event-error.sub.html\", \"9298bc64-aba3-4cf2-8943-12823d317f6b\");\n\nvar timer = null;\nif (30000) {\n timer = setTimeout(function() {\n log(\"Timeout fired\");\n window.wrappedJSObject.win.timeout();\n }, 30000);\n}\n","newSandbox":false,"line":445,"args":[],"filename":"executormarionette.py"}]
23:36:27 INFO - PROCESS | 3252 | ++DOCSHELL 000000E25E184000 == 26 [pid = 3252] [id = 30]
23:36:27 INFO - PROCESS | 3252 | ++DOMWINDOW == 69 (000000E25E18A800) [pid = 3252] [serial = 87] [outer = 0000000000000000]
23:36:27 INFO - PROCESS | 3252 | ++DOMWINDOW == 70 (000000E25F9E2800) [pid = 3252] [serial = 88] [outer = 000000E25E18A800]
23:36:27 INFO - PROCESS | 3252 | 1477636587541 Marionette DEBUG loaded listener.js
23:36:27 INFO - PROCESS | 3252 | ++DOMWINDOW == 71 (000000E25B376800) [pid = 3252] [serial = 89] [outer = 000000E25E18A800]
23:36:27 INFO - PROCESS | 3252 | [3252] WARNING: NS_ENSURE_SUCCESS(status, status) failed with result 0x804B001E: file c:/builds/moz2_slave/fx-team-w64-d-0000000000000000/build/src/netwerk/protocol/http/nsCORSListenerProxy.cpp, line 553
23:36:27 INFO - PROCESS | 3252 | 1477636587951 Marionette TRACE conn5 <- [1,106,null,{"value":["/XMLHttpRequest/event-error.sub.html",0,null,null,[["XMLHttpRequest Test: event - error",0,null,null]]]}]
23:36:28 INFO - .
23:36:28 INFO - TEST-OK | /XMLHttpRequest/event-error.sub.html | took 734ms
23:36:28 INFO - PROCESS | 3252 | 1477636588025 Marionette TRACE conn5 -> [0,107,"getWindowHandle",null]
23:36:28 INFO - PROCESS | 3252 | 1477636588028 Marionette TRACE conn5 <- [1,107,null,{"value":"13"}]
23:36:28 INFO - TEST-START | /XMLHttpRequest/event-load.htm
23:36:28 INFO - PROCESS | 3252 | 1477636588034 Marionette TRACE conn5 -> [0,108,"executeScript",{"scriptTimeout":null,"newSandbox":true,"args":[],"filename":"executormarionette.py","script":"if (window.wrappedJSObject.win) {window.wrappedJSObject.win.close()}","sandbox":"default","line":430}]
23:36:28 INFO - PROCESS | 3252 | 1477636588142 Marionette TRACE conn5 <- [1,108,null,{"value":null}]
23:36:28 INFO - PROCESS | 3252 | 1477636588238 Marionette TRACE conn5 -> [0,109,"getWindowHandles",null]
23:36:28 INFO - PROCESS | 3252 | 1477636588241 Marionette TRACE conn5 <- [1,109,null,["13"]]
23:36:28 INFO - PROCESS | 3252 | 1477636588244 Marionette TRACE conn5 -> [0,110,"switchToWindow",{"name":"13"}]
23:36:28 INFO - PROCESS | 3252 | 1477636588249 Marionette TRACE conn5 <- [1,110,null,{}]
23:36:28 INFO - PROCESS | 3252 | 1477636588255 Marionette TRACE conn5 -> [0,111,"executeAsyncScript",{"scriptTimeout":null,"sandbox":"default","debug_script":false,"script":"/* This Source Code Form is subject to the terms of the Mozilla Public\n * License, v. 2.0. If a copy of the MPL was not distributed with this\n * file, You can obtain one at http://mozilla.org/MPL/2.0/. */\n\nwindow.wrappedJSObject.timeout_multiplier = 3;\nwindow.wrappedJSObject.explicit_timeout = 0;\n\nwindow.wrappedJSObject.addEventListener(\"message\", function listener(event) {\n if (event.data.type != \"complete\") {\n return;\n }\n window.wrappedJSObject.removeEventListener(\"message\", listener);\n clearTimeout(timer);\n var tests = event.data.tests;\n var status = event.data.status;\n\n var subtest_results = tests.map(function(x) {\n return [x.name, x.status, x.message, x.stack]\n });\n\n marionetteScriptFinished([\"/XMLHttpRequest/event-load.htm\",\n status.status,\n status.message,\n status.stack,\n subtest_results]);\n}, false);\n\nwindow.wrappedJSObject.win = window.open(\"http://web-platform.test:8000/XMLHttpRequest/event-load.htm\", \"9298bc64-aba3-4cf2-8943-12823d317f6b\");\n\nvar timer = null;\nif (30000) {\n timer = setTimeout(function() {\n log(\"Timeout fired\");\n window.wrappedJSObject.win.timeout();\n }, 30000);\n}\n","newSandbox":false,"line":445,"args":[],"filename":"executormarionette.py"}]
23:36:28 INFO - PROCESS | 3252 | ++DOCSHELL 000000E24E20E800 == 27 [pid = 3252] [id = 31]
23:36:28 INFO - PROCESS | 3252 | ++DOMWINDOW == 72 (000000E24E60F000) [pid = 3252] [serial = 90] [outer = 0000000000000000]
23:36:28 INFO - PROCESS | 3252 | ++DOMWINDOW == 73 (000000E260D97000) [pid = 3252] [serial = 91] [outer = 000000E24E60F000]
23:36:28 INFO - PROCESS | 3252 | 1477636588322 Marionette DEBUG loaded listener.js
23:36:28 INFO - PROCESS | 3252 | ++DOMWINDOW == 74 (000000E260DB6800) [pid = 3252] [serial = 92] [outer = 000000E24E60F000]
23:36:28 INFO - PROCESS | 3252 | 1477636588846 Marionette TRACE conn5 <- [1,111,null,{"value":["/XMLHttpRequest/event-load.htm",0,null,null,[["XMLHttpRequest: The send() method: Fire an event named load (synchronous flag is unset)",0,null,null]]]}]
23:36:28 INFO - .
23:36:28 INFO - TEST-OK | /XMLHttpRequest/event-load.htm | took 838ms
23:36:28 INFO - PROCESS | 3252 | 1477636588872 Marionette TRACE conn5 -> [0,112,"getWindowHandle",null]
23:36:28 INFO - PROCESS | 3252 | 1477636588877 Marionette TRACE conn5 <- [1,112,null,{"value":"13"}]
23:36:28 INFO - TEST-START | /XMLHttpRequest/event-loadend.htm
23:36:28 INFO - PROCESS | 3252 | 1477636588884 Marionette TRACE conn5 -> [0,113,"executeScript",{"scriptTimeout":null,"newSandbox":true,"args":[],"filename":"executormarionette.py","script":"if (window.wrappedJSObject.win) {window.wrappedJSObject.win.close()}","sandbox":"default","line":430}]
23:36:29 INFO - PROCESS | 3252 | 1477636589005 Marionette TRACE conn5 <- [1,113,null,{"value":null}]
23:36:29 INFO - PROCESS | 3252 | 1477636589064 Marionette TRACE conn5 -> [0,114,"getWindowHandles",null]
23:36:29 INFO - PROCESS | 3252 | 1477636589068 Marionette TRACE conn5 <- [1,114,null,["13"]]
23:36:29 INFO - PROCESS | 3252 | 1477636589073 Marionette TRACE conn5 -> [0,115,"switchToWindow",{"name":"13"}]
23:36:29 INFO - PROCESS | 3252 | 1477636589078 Marionette TRACE conn5 <- [1,115,null,{}]
23:36:29 INFO - PROCESS | 3252 | 1477636589127 Marionette TRACE conn5 -> [0,116,"executeAsyncScript",{"scriptTimeout":null,"sandbox":"default","debug_script":false,"script":"/* This Source Code Form is subject to the terms of the Mozilla Public\n * License, v. 2.0. If a copy of the MPL was not distributed with this\n * file, You can obtain one at http://mozilla.org/MPL/2.0/. */\n\nwindow.wrappedJSObject.timeout_multiplier = 3;\nwindow.wrappedJSObject.explicit_timeout = 0;\n\nwindow.wrappedJSObject.addEventListener(\"message\", function listener(event) {\n if (event.data.type != \"complete\") {\n return;\n }\n window.wrappedJSObject.removeEventListener(\"message\", listener);\n clearTimeout(timer);\n var tests = event.data.tests;\n var status = event.data.status;\n\n var subtest_results = tests.map(function(x) {\n return [x.name, x.status, x.message, x.stack]\n });\n\n marionetteScriptFinished([\"/XMLHttpRequest/event-loadend.htm\",\n status.status,\n status.message,\n status.stack,\n subtest_results]);\n}, false);\n\nwindow.wrappedJSObject.win = window.open(\"http://web-platform.test:8000/XMLHttpRequest/event-loadend.htm\", \"9298bc64-aba3-4cf2-8943-12823d317f6b\");\n\nvar timer = null;\nif (30000) {\n timer = setTimeout(function() {\n log(\"Timeout fired\");\n window.wrappedJSObject.win.timeout();\n }, 30000);\n}\n","newSandbox":false,"line":445,"args":[],"filename":"executormarionette.py"}]
23:36:29 INFO - PROCESS | 3252 | ++DOCSHELL 000000E2525FB000 == 28 [pid = 3252] [id = 32]
23:36:29 INFO - PROCESS | 3252 | ++DOMWINDOW == 75 (000000E252AC1000) [pid = 3252] [serial = 93] [outer = 0000000000000000]
23:36:29 INFO - PROCESS | 3252 | ++DOMWINDOW == 76 (000000E254316800) [pid = 3252] [serial = 94] [outer = 000000E252AC1000]
23:36:29 INFO - PROCESS | 3252 | 1477636589194 Marionette DEBUG loaded listener.js
23:36:29 INFO - PROCESS | 3252 | ++DOMWINDOW == 77 (000000E25817F800) [pid = 3252] [serial = 95] [outer = 000000E252AC1000]
23:36:29 INFO - PROCESS | 3252 | --DOCSHELL 000000E24DED7800 == 27 [pid = 3252] [id = 11]
23:36:29 INFO - PROCESS | 3252 | 1477636589609 Marionette TRACE conn5 <- [1,116,null,{"value":["/XMLHttpRequest/event-loadend.htm",0,null,null,[["XMLHttpRequest: loadend event",0,null,null]]]}]
23:36:29 INFO - .
23:36:29 INFO - TEST-OK | /XMLHttpRequest/event-loadend.htm | took 777ms
23:36:29 INFO - PROCESS | 3252 | 1477636589663 Marionette TRACE conn5 -> [0,117,"getWindowHandle",null]
23:36:29 INFO - PROCESS | 3252 | 1477636589666 Marionette TRACE conn5 <- [1,117,null,{"value":"13"}]
23:36:29 INFO - TEST-START | /XMLHttpRequest/event-loadstart.htm
23:36:29 INFO - PROCESS | 3252 | 1477636589672 Marionette TRACE conn5 -> [0,118,"executeScript",{"scriptTimeout":null,"newSandbox":true,"args":[],"filename":"executormarionette.py","script":"if (window.wrappedJSObject.win) {window.wrappedJSObject.win.close()}","sandbox":"default","line":430}]
23:36:29 INFO - PROCESS | 3252 | 1477636589771 Marionette TRACE conn5 <- [1,118,null,{"value":null}]
23:36:29 INFO - PROCESS | 3252 | 1477636589777 Marionette TRACE conn5 -> [0,119,"getWindowHandles",null]
23:36:29 INFO - PROCESS | 3252 | 1477636589780 Marionette TRACE conn5 <- [1,119,null,["13"]]
23:36:29 INFO - PROCESS | 3252 | 1477636589785 Marionette TRACE conn5 -> [0,120,"switchToWindow",{"name":"13"}]
23:36:29 INFO - PROCESS | 3252 | 1477636589789 Marionette TRACE conn5 <- [1,120,null,{}]
23:36:29 INFO - PROCESS | 3252 | 1477636589792 Marionette TRACE conn5 -> [0,121,"executeAsyncScript",{"scriptTimeout":null,"sandbox":"default","debug_script":false,"script":"/* This Source Code Form is subject to the terms of the Mozilla Public\n * License, v. 2.0. If a copy of the MPL was not distributed with this\n * file, You can obtain one at http://mozilla.org/MPL/2.0/. */\n\nwindow.wrappedJSObject.timeout_multiplier = 3;\nwindow.wrappedJSObject.explicit_timeout = 0;\n\nwindow.wrappedJSObject.addEventListener(\"message\", function listener(event) {\n if (event.data.type != \"complete\") {\n return;\n }\n window.wrappedJSObject.removeEventListener(\"message\", listener);\n clearTimeout(timer);\n var tests = event.data.tests;\n var status = event.data.status;\n\n var subtest_results = tests.map(function(x) {\n return [x.name, x.status, x.message, x.stack]\n });\n\n marionetteScriptFinished([\"/XMLHttpRequest/event-loadstart.htm\",\n status.status,\n status.message,\n status.stack,\n subtest_results]);\n}, false);\n\nwindow.wrappedJSObject.win = window.open(\"http://web-platform.test:8000/XMLHttpRequest/event-loadstart.htm\", \"9298bc64-aba3-4cf2-8943-12823d317f6b\");\n\nvar timer = null;\nif (30000) {\n timer = setTimeout(function() {\n log(\"Timeout fired\");\n window.wrappedJSObject.win.timeout();\n }, 30000);\n}\n","newSandbox":false,"line":445,"args":[],"filename":"executormarionette.py"}]
23:36:29 INFO - PROCESS | 3252 | ++DOCSHELL 000000E256F0E800 == 28 [pid = 3252] [id = 33]
23:36:29 INFO - PROCESS | 3252 | ++DOMWINDOW == 78 (000000E256F14800) [pid = 3252] [serial = 96] [outer = 0000000000000000]
23:36:29 INFO - PROCESS | 3252 | ++DOMWINDOW == 79 (000000E25810E000) [pid = 3252] [serial = 97] [outer = 000000E256F14800]
23:36:29 INFO - PROCESS | 3252 | 1477636589849 Marionette DEBUG loaded listener.js
23:36:29 INFO - PROCESS | 3252 | ++DOMWINDOW == 80 (000000E25A2C4800) [pid = 3252] [serial = 98] [outer = 000000E256F14800]
23:36:30 INFO - PROCESS | 3252 | 1477636590225 Marionette TRACE conn5 <- [1,121,null,{"value":["/XMLHttpRequest/event-loadstart.htm",0,null,null,[["XMLHttpRequest: loadstart event",0,null,null]]]}]
23:36:30 INFO - .
23:36:30 INFO - TEST-OK | /XMLHttpRequest/event-loadstart.htm | took 587ms
23:36:30 INFO - PROCESS | 3252 | 1477636590265 Marionette TRACE conn5 -> [0,122,"getWindowHandle",null]
23:36:30 INFO - PROCESS | 3252 | 1477636590270 Marionette TRACE conn5 <- [1,122,null,{"value":"13"}]
23:36:30 INFO - TEST-START | /XMLHttpRequest/event-progress.htm
23:36:30 INFO - PROCESS | 3252 | 1477636590275 Marionette TRACE conn5 -> [0,123,"executeScript",{"scriptTimeout":null,"newSandbox":true,"args":[],"filename":"executormarionette.py","script":"if (window.wrappedJSObject.win) {window.wrappedJSObject.win.close()}","sandbox":"default","line":430}]
23:36:30 INFO - PROCESS | 3252 | 1477636590370 Marionette TRACE conn5 <- [1,123,null,{"value":null}]
23:36:30 INFO - PROCESS | 3252 | 1477636590379 Marionette TRACE conn5 -> [0,124,"getWindowHandles",null]
23:36:30 INFO - PROCESS | 3252 | 1477636590382 Marionette TRACE conn5 <- [1,124,null,["13"]]
23:36:30 INFO - PROCESS | 3252 | 1477636590435 Marionette TRACE conn5 -> [0,125,"switchToWindow",{"name":"13"}]
23:36:30 INFO - PROCESS | 3252 | 1477636590440 Marionette TRACE conn5 <- [1,125,null,{}]
23:36:30 INFO - PROCESS | 3252 | 1477636590444 Marionette TRACE conn5 -> [0,126,"executeAsyncScript",{"scriptTimeout":null,"sandbox":"default","debug_script":false,"script":"/* This Source Code Form is subject to the terms of the Mozilla Public\n * License, v. 2.0. If a copy of the MPL was not distributed with this\n * file, You can obtain one at http://mozilla.org/MPL/2.0/. */\n\nwindow.wrappedJSObject.timeout_multiplier = 3;\nwindow.wrappedJSObject.explicit_timeout = 0;\n\nwindow.wrappedJSObject.addEventListener(\"message\", function listener(event) {\n if (event.data.type != \"complete\") {\n return;\n }\n window.wrappedJSObject.removeEventListener(\"message\", listener);\n clearTimeout(timer);\n var tests = event.data.tests;\n var status = event.data.status;\n\n var subtest_results = tests.map(function(x) {\n return [x.name, x.status, x.message, x.stack]\n });\n\n marionetteScriptFinished([\"/XMLHttpRequest/event-progress.htm\",\n status.status,\n status.message,\n status.stack,\n subtest_results]);\n}, false);\n\nwindow.wrappedJSObject.win = window.open(\"http://web-platform.test:8000/XMLHttpRequest/event-progress.htm\", \"9298bc64-aba3-4cf2-8943-12823d317f6b\");\n\nvar timer = null;\nif (30000) {\n timer = setTimeout(function() {\n log(\"Timeout fired\");\n window.wrappedJSObject.win.timeout();\n }, 30000);\n}\n","newSandbox":false,"line":445,"args":[],"filename":"executormarionette.py"}]
23:36:30 INFO - PROCESS | 3252 | ++DOCSHELL 000000E25B139000 == 29 [pid = 3252] [id = 34]
23:36:30 INFO - PROCESS | 3252 | ++DOMWINDOW == 81 (000000E25B13B000) [pid = 3252] [serial = 99] [outer = 0000000000000000]
23:36:30 INFO - PROCESS | 3252 | ++DOMWINDOW == 82 (000000E25B617000) [pid = 3252] [serial = 100] [outer = 000000E25B13B000]
23:36:30 INFO - PROCESS | 3252 | 1477636590502 Marionette DEBUG loaded listener.js
23:36:30 INFO - PROCESS | 3252 | ++DOMWINDOW == 83 (000000E25BB9C000) [pid = 3252] [serial = 101] [outer = 000000E25B13B000]
23:36:32 INFO - PROCESS | 3252 | --DOMWINDOW == 82 (000000E25D871800) [pid = 3252] [serial = 69] [outer = 0000000000000000] [url = http://web-platform.test:8000/XMLHttpRequest/abort-upload-event-abort.htm]
23:36:32 INFO - PROCESS | 3252 | --DOMWINDOW == 81 (000000E25F59C800) [pid = 3252] [serial = 75] [outer = 0000000000000000] [url = http://web-platform.test:8000/XMLHttpRequest/anonymous-mode-unsupported.htm]
23:36:32 INFO - PROCESS | 3252 | --DOMWINDOW == 80 (000000E25E17A000) [pid = 3252] [serial = 72] [outer = 0000000000000000] [url = http://web-platform.test:8000/XMLHttpRequest/abort-upload-event-loadend.htm]
23:36:32 INFO - PROCESS | 3252 | --DOMWINDOW == 79 (000000E24F369800) [pid = 3252] [serial = 42] [outer = 0000000000000000] [url = http://web-platform.test:8000/XMLHttpRequest/abort-during-done.htm]
23:36:32 INFO - PROCESS | 3252 | --DOMWINDOW == 78 (000000E258182000) [pid = 3252] [serial = 51] [outer = 0000000000000000] [url = http://web-platform.test:8000/XMLHttpRequest/abort-during-unsent.htm]
23:36:32 INFO - PROCESS | 3252 | --DOMWINDOW == 77 (000000E25AED7000) [pid = 3252] [serial = 60] [outer = 0000000000000000] [url = http://web-platform.test:8000/XMLHttpRequest/abort-event-listeners.htm]
23:36:32 INFO - PROCESS | 3252 | --DOMWINDOW == 76 (000000E24DED8000) [pid = 3252] [serial = 29] [outer = 0000000000000000] [url = http://web-platform.test:8000/XMLHttpRequest/abort-after-stop.htm]
23:36:32 INFO - PROCESS | 3252 | --DOMWINDOW == 75 (000000E253717000) [pid = 3252] [serial = 45] [outer = 0000000000000000] [url = http://web-platform.test:8000/XMLHttpRequest/abort-during-open.htm]
23:36:32 INFO - PROCESS | 3252 | --DOMWINDOW == 74 (000000E25A9D9800) [pid = 3252] [serial = 57] [outer = 0000000000000000] [url = http://web-platform.test:8000/XMLHttpRequest/abort-event-abort.htm]
23:36:32 INFO - PROCESS | 3252 | --DOMWINDOW == 73 (000000E259E29800) [pid = 3252] [serial = 54] [outer = 0000000000000000] [url = http://web-platform.test:8000/XMLHttpRequest/abort-during-upload.htm]
23:36:32 INFO - PROCESS | 3252 | --DOMWINDOW == 72 (000000E256F12800) [pid = 3252] [serial = 48] [outer = 0000000000000000] [url = http://web-platform.test:8000/XMLHttpRequest/abort-during-open.worker]
23:36:32 INFO - PROCESS | 3252 | --DOMWINDOW == 71 (000000E25B13C000) [pid = 3252] [serial = 63] [outer = 0000000000000000] [url = http://web-platform.test:8000/XMLHttpRequest/abort-event-loadend.htm]
23:36:32 INFO - PROCESS | 3252 | --DOMWINDOW == 70 (000000E25B84B000) [pid = 3252] [serial = 66] [outer = 0000000000000000] [url = http://web-platform.test:8000/XMLHttpRequest/abort-event-order.htm]
23:36:32 INFO - PROCESS | 3252 | --DOMWINDOW == 69 (000000E24DED0800) [pid = 3252] [serial = 38] [outer = 0000000000000000] [url = http://web-platform.test:8000/XMLHttpRequest/abort-after-timeout.htm]
23:36:33 INFO - PROCESS | 3252 | 1477636593789 Marionette TRACE conn5 <- [1,126,null,{"value":["/XMLHttpRequest/event-progress.htm",0,null,null,[["XMLHttpRequest: The send() method: Fire a progress event named progress (synchronous flag is unset)",0,null,null]]]}]
23:36:33 INFO - .
23:36:33 INFO - TEST-OK | /XMLHttpRequest/event-progress.htm | took 3560ms
23:36:33 INFO - PROCESS | 3252 | 1477636593839 Marionette TRACE conn5 -> [0,127,"getWindowHandle",null]
23:36:33 INFO - PROCESS | 3252 | 1477636593842 Marionette TRACE conn5 <- [1,127,null,{"value":"13"}]
23:36:33 INFO - TEST-START | /XMLHttpRequest/event-readystate-sync-open.htm
23:36:33 INFO - PROCESS | 3252 | 1477636593846 Marionette TRACE conn5 -> [0,128,"executeScript",{"scriptTimeout":null,"newSandbox":true,"args":[],"filename":"executormarionette.py","script":"if (window.wrappedJSObject.win) {window.wrappedJSObject.win.close()}","sandbox":"default","line":430}]
23:36:33 INFO - PROCESS | 3252 | 1477636593966 Marionette TRACE conn5 <- [1,128,null,{"value":null}]
23:36:33 INFO - PROCESS | 3252 | 1477636593973 Marionette TRACE conn5 -> [0,129,"getWindowHandles",null]
23:36:33 INFO - PROCESS | 3252 | 1477636593975 Marionette TRACE conn5 <- [1,129,null,["13"]]
23:36:33 INFO - PROCESS | 3252 | 1477636593978 Marionette TRACE conn5 -> [0,130,"switchToWindow",{"name":"13"}]
23:36:33 INFO - PROCESS | 3252 | 1477636593982 Marionette TRACE conn5 <- [1,130,null,{}]
23:36:33 INFO - PROCESS | 3252 | 1477636593986 Marionette TRACE conn5 -> [0,131,"executeAsyncScript",{"scriptTimeout":null,"sandbox":"default","debug_script":false,"script":"/* This Source Code Form is subject to the terms of the Mozilla Public\n * License, v. 2.0. If a copy of the MPL was not distributed with this\n * file, You can obtain one at http://mozilla.org/MPL/2.0/. */\n\nwindow.wrappedJSObject.timeout_multiplier = 3;\nwindow.wrappedJSObject.explicit_timeout = 0;\n\nwindow.wrappedJSObject.addEventListener(\"message\", function listener(event) {\n if (event.data.type != \"complete\") {\n return;\n }\n window.wrappedJSObject.removeEventListener(\"message\", listener);\n clearTimeout(timer);\n var tests = event.data.tests;\n var status = event.data.status;\n\n var subtest_results = tests.map(function(x) {\n return [x.name, x.status, x.message, x.stack]\n });\n\n marionetteScriptFinished([\"/XMLHttpRequest/event-readystate-sync-open.htm\",\n status.status,\n status.message,\n status.stack,\n subtest_results]);\n}, false);\n\nwindow.wrappedJSObject.win = window.open(\"http://web-platform.test:8000/XMLHttpRequest/event-readystate-sync-open.htm\", \"9298bc64-aba3-4cf2-8943-12823d317f6b\");\n\nvar timer = null;\nif (30000) {\n timer = setTimeout(function() {\n log(\"Timeout fired\");\n window.wrappedJSObject.win.timeout();\n }, 30000);\n}\n","newSandbox":false,"line":445,"args":[],"filename":"executormarionette.py"}]
23:36:34 INFO - PROCESS | 3252 | ++DOCSHELL 000000E25E0D3800 == 30 [pid = 3252] [id = 35]
23:36:34 INFO - PROCESS | 3252 | ++DOMWINDOW == 70 (000000E25E170000) [pid = 3252] [serial = 102] [outer = 0000000000000000]
23:36:34 INFO - PROCESS | 3252 | ++DOMWINDOW == 71 (000000E25E18A000) [pid = 3252] [serial = 103] [outer = 000000E25E170000]
23:36:34 INFO - PROCESS | 3252 | 1477636594041 Marionette DEBUG loaded listener.js
23:36:34 INFO - PROCESS | 3252 | ++DOMWINDOW == 72 (000000E25E17A000) [pid = 3252] [serial = 104] [outer = 000000E25E170000]
23:36:34 INFO - PROCESS | 3252 | 1477636594387 Marionette TRACE conn5 <- [1,131,null,{"value":["/XMLHttpRequest/event-readystate-sync-open.htm",0,null,null,[["XMLHttpRequest: open() call fires sync readystate event (sync)",0,null,null],["XMLHttpRequest: open() call fires sync readystate event (async)",0,null,null]]]}]
23:36:34 INFO - ..
23:36:34 INFO - TEST-OK | /XMLHttpRequest/event-readystate-sync-open.htm | took 586ms
23:36:34 INFO - PROCESS | 3252 | 1477636594434 Marionette TRACE conn5 -> [0,132,"getWindowHandle",null]
23:36:34 INFO - PROCESS | 3252 | 1477636594436 Marionette TRACE conn5 <- [1,132,null,{"value":"13"}]
23:36:34 INFO - TEST-START | /XMLHttpRequest/event-readystatechange-loaded.htm
23:36:34 INFO - PROCESS | 3252 | 1477636594441 Marionette TRACE conn5 -> [0,133,"executeScript",{"scriptTimeout":null,"newSandbox":true,"args":[],"filename":"executormarionette.py","script":"if (window.wrappedJSObject.win) {window.wrappedJSObject.win.close()}","sandbox":"default","line":430}]
23:36:34 INFO - PROCESS | 3252 | 1477636594554 Marionette TRACE conn5 <- [1,133,null,{"value":null}]
23:36:34 INFO - PROCESS | 3252 | 1477636594561 Marionette TRACE conn5 -> [0,134,"getWindowHandles",null]
23:36:34 INFO - PROCESS | 3252 | 1477636594563 Marionette TRACE conn5 <- [1,134,null,["13"]]
23:36:34 INFO - PROCESS | 3252 | 1477636594567 Marionette TRACE conn5 -> [0,135,"switchToWindow",{"name":"13"}]
23:36:34 INFO - PROCESS | 3252 | 1477636594571 Marionette TRACE conn5 <- [1,135,null,{}]
23:36:34 INFO - PROCESS | 3252 | 1477636594574 Marionette TRACE conn5 -> [0,136,"executeAsyncScript",{"scriptTimeout":null,"sandbox":"default","debug_script":false,"script":"/* This Source Code Form is subject to the terms of the Mozilla Public\n * License, v. 2.0. If a copy of the MPL was not distributed with this\n * file, You can obtain one at http://mozilla.org/MPL/2.0/. */\n\nwindow.wrappedJSObject.timeout_multiplier = 3;\nwindow.wrappedJSObject.explicit_timeout = 0;\n\nwindow.wrappedJSObject.addEventListener(\"message\", function listener(event) {\n if (event.data.type != \"complete\") {\n return;\n }\n window.wrappedJSObject.removeEventListener(\"message\", listener);\n clearTimeout(timer);\n var tests = event.data.tests;\n var status = event.data.status;\n\n var subtest_results = tests.map(function(x) {\n return [x.name, x.status, x.message, x.stack]\n });\n\n marionetteScriptFinished([\"/XMLHttpRequest/event-readystatechange-loaded.htm\",\n status.status,\n status.message,\n status.stack,\n subtest_results]);\n}, false);\n\nwindow.wrappedJSObject.win = window.open(\"http://web-platform.test:8000/XMLHttpRequest/event-readystatechange-loaded.htm\", \"9298bc64-aba3-4cf2-8943-12823d317f6b\");\n\nvar timer = null;\nif (30000) {\n timer = setTimeout(function() {\n log(\"Timeout fired\");\n window.wrappedJSObject.win.timeout();\n }, 30000);\n}\n","newSandbox":false,"line":445,"args":[],"filename":"executormarionette.py"}]
23:36:34 INFO - PROCESS | 3252 | ++DOCSHELL 000000E260D93800 == 31 [pid = 3252] [id = 36]
23:36:34 INFO - PROCESS | 3252 | ++DOMWINDOW == 73 (000000E260D94000) [pid = 3252] [serial = 105] [outer = 0000000000000000]
23:36:34 INFO - PROCESS | 3252 | ++DOMWINDOW == 74 (000000E260DB2800) [pid = 3252] [serial = 106] [outer = 000000E260D94000]
23:36:34 INFO - PROCESS | 3252 | 1477636594627 Marionette DEBUG loaded listener.js
23:36:34 INFO - PROCESS | 3252 | ++DOMWINDOW == 75 (000000E260EA0800) [pid = 3252] [serial = 107] [outer = 000000E260D94000]
23:36:37 INFO - PROCESS | 3252 | --DOMWINDOW == 74 (000000E25F9E1000) [pid = 3252] [serial = 76] [outer = 0000000000000000] [url = about:blank]
23:36:37 INFO - PROCESS | 3252 | --DOMWINDOW == 73 (000000E260268000) [pid = 3252] [serial = 77] [outer = 0000000000000000] [url = about:blank]
23:36:37 INFO - PROCESS | 3252 | --DOMWINDOW == 72 (000000E25E17E800) [pid = 3252] [serial = 73] [outer = 0000000000000000] [url = about:blank]
23:36:37 INFO - PROCESS | 3252 | --DOMWINDOW == 71 (000000E25F57E800) [pid = 3252] [serial = 74] [outer = 0000000000000000] [url = about:blank]
23:36:37 INFO - PROCESS | 3252 | --DOMWINDOW == 70 (000000E25DD1E800) [pid = 3252] [serial = 70] [outer = 0000000000000000] [url = about:blank]
23:36:37 INFO - PROCESS | 3252 | --DOMWINDOW == 69 (000000E25DE0E000) [pid = 3252] [serial = 71] [outer = 0000000000000000] [url = about:blank]
23:36:37 INFO - PROCESS | 3252 | --DOMWINDOW == 68 (000000E25BB9A800) [pid = 3252] [serial = 67] [outer = 0000000000000000] [url = about:blank]
23:36:37 INFO - PROCESS | 3252 | --DOMWINDOW == 67 (000000E25BDCD000) [pid = 3252] [serial = 68] [outer = 0000000000000000] [url = about:blank]
23:36:37 INFO - PROCESS | 3252 | --DOMWINDOW == 66 (000000E25B14D000) [pid = 3252] [serial = 64] [outer = 0000000000000000] [url = about:blank]
23:36:37 INFO - PROCESS | 3252 | --DOMWINDOW == 65 (000000E25B38B800) [pid = 3252] [serial = 65] [outer = 0000000000000000] [url = about:blank]
23:36:37 INFO - PROCESS | 3252 | --DOMWINDOW == 64 (000000E25AEDD000) [pid = 3252] [serial = 61] [outer = 0000000000000000] [url = about:blank]
23:36:37 INFO - PROCESS | 3252 | --DOMWINDOW == 63 (000000E25AEE9800) [pid = 3252] [serial = 62] [outer = 0000000000000000] [url = about:blank]
23:36:37 INFO - PROCESS | 3252 | --DOMWINDOW == 62 (000000E25A9DF000) [pid = 3252] [serial = 58] [outer = 0000000000000000] [url = about:blank]
23:36:37 INFO - PROCESS | 3252 | --DOMWINDOW == 61 (000000E25ACBE000) [pid = 3252] [serial = 59] [outer = 0000000000000000] [url = about:blank]
23:36:37 INFO - PROCESS | 3252 | --DOMWINDOW == 60 (000000E259E32800) [pid = 3252] [serial = 55] [outer = 0000000000000000] [url = about:blank]
23:36:37 INFO - PROCESS | 3252 | --DOMWINDOW == 59 (000000E25A14B000) [pid = 3252] [serial = 56] [outer = 0000000000000000] [url = about:blank]
23:36:37 INFO - PROCESS | 3252 | --DOMWINDOW == 58 (000000E258186000) [pid = 3252] [serial = 52] [outer = 0000000000000000] [url = about:blank]
23:36:37 INFO - PROCESS | 3252 | --DOMWINDOW == 57 (000000E258189000) [pid = 3252] [serial = 53] [outer = 0000000000000000] [url = about:blank]
23:36:37 INFO - PROCESS | 3252 | --DOMWINDOW == 56 (000000E256F17000) [pid = 3252] [serial = 49] [outer = 0000000000000000] [url = about:blank]
23:36:37 INFO - PROCESS | 3252 | --DOMWINDOW == 55 (000000E25709C000) [pid = 3252] [serial = 50] [outer = 0000000000000000] [url = about:blank]
23:36:37 INFO - PROCESS | 3252 | --DOMWINDOW == 54 (000000E254303000) [pid = 3252] [serial = 46] [outer = 0000000000000000] [url = about:blank]
23:36:37 INFO - PROCESS | 3252 | --DOMWINDOW == 53 (000000E254315800) [pid = 3252] [serial = 47] [outer = 0000000000000000] [url = about:blank]
23:36:37 INFO - PROCESS | 3252 | --DOMWINDOW == 52 (000000E2525EF000) [pid = 3252] [serial = 43] [outer = 0000000000000000] [url = about:blank]
23:36:37 INFO - PROCESS | 3252 | --DOMWINDOW == 51 (000000E253050800) [pid = 3252] [serial = 44] [outer = 0000000000000000] [url = about:blank]
23:36:37 INFO - PROCESS | 3252 | --DOMWINDOW == 50 (000000E24DEDA800) [pid = 3252] [serial = 39] [outer = 0000000000000000] [url = about:blank]
23:36:37 INFO - PROCESS | 3252 | --DOMWINDOW == 49 (000000E24E220000) [pid = 3252] [serial = 40] [outer = 0000000000000000] [url = about:blank]
23:36:37 INFO - PROCESS | 3252 | --DOMWINDOW == 48 (000000E24EAAB800) [pid = 3252] [serial = 37] [outer = 0000000000000000] [url = about:neterror?e=dnsNotFound&u=https%3A//%25%28server%29s/selfsupport-dummy/&c=UTF-8&f=regular&d=Firefox%20can%E2%80%99t%20find%20the%20server%20at%20%25%28server%29s.]
23:36:37 INFO - PROCESS | 3252 | --DOMWINDOW == 47 (000000E24E21D000) [pid = 3252] [serial = 31] [outer = 0000000000000000] [url = about:blank]
23:36:37 INFO - PROCESS | 3252 | --DOMWINDOW == 46 (000000E2604C4000) [pid = 3252] [serial = 79] [outer = 0000000000000000] [url = about:blank]
23:36:40 INFO - PROCESS | 3252 | --DOMWINDOW == 45 (000000E25E18A800) [pid = 3252] [serial = 87] [outer = 0000000000000000] [url = http://web-platform.test:8000/XMLHttpRequest/event-error.sub.html]
23:36:40 INFO - PROCESS | 3252 | --DOMWINDOW == 44 (000000E25A2D6800) [pid = 3252] [serial = 84] [outer = 0000000000000000] [url = http://web-platform.test:8000/XMLHttpRequest/event-error-order.sub.html]
23:36:40 INFO - PROCESS | 3252 | --DOMWINDOW == 43 (000000E258174000) [pid = 3252] [serial = 78] [outer = 0000000000000000] [url = http://web-platform.test:8000/XMLHttpRequest/data-uri.htm]
23:36:40 INFO - PROCESS | 3252 | --DOMWINDOW == 42 (000000E253695800) [pid = 3252] [serial = 81] [outer = 0000000000000000] [url = http://web-platform.test:8000/XMLHttpRequest/event-abort.htm]
23:36:40 INFO - PROCESS | 3252 | --DOMWINDOW == 41 (000000E24E60F000) [pid = 3252] [serial = 90] [outer = 0000000000000000] [url = http://web-platform.test:8000/XMLHttpRequest/event-load.htm]
23:36:40 INFO - PROCESS | 3252 | --DOMWINDOW == 40 (000000E256F14800) [pid = 3252] [serial = 96] [outer = 0000000000000000] [url = http://web-platform.test:8000/XMLHttpRequest/event-loadstart.htm]
23:36:40 INFO - PROCESS | 3252 | --DOMWINDOW == 39 (000000E252AC1000) [pid = 3252] [serial = 93] [outer = 0000000000000000] [url = http://web-platform.test:8000/XMLHttpRequest/event-loadend.htm]
23:36:40 INFO - PROCESS | 3252 | --DOMWINDOW == 38 (000000E25E170000) [pid = 3252] [serial = 102] [outer = 0000000000000000] [url = http://web-platform.test:8000/XMLHttpRequest/event-readystate-sync-open.htm]
23:36:40 INFO - PROCESS | 3252 | --DOMWINDOW == 37 (000000E25B13B000) [pid = 3252] [serial = 99] [outer = 0000000000000000] [url = http://web-platform.test:8000/XMLHttpRequest/event-progress.htm]
23:36:40 INFO - PROCESS | 3252 | 1477636600933 Marionette TRACE conn5 <- [1,136,null,{"value":["/XMLHttpRequest/event-readystatechange-loaded.htm",0,null,null,[["XMLHttpRequest: the LOADING state change should only happen once",1,"assert_equals: LOADING state change may only be emitted once expected 1 but got 10","client.onreadystatechange<@http://web-platform.test:8000/XMLHttpRequest/event-readystatechange-loaded.htm:29:13\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nTest.prototype.step_func/<@http://web-platform.test:8000/resources/testharness.js:1425:20\nEventHandlerNonNull*@http://web-platform.test:8000/XMLHttpRequest/event-readystatechange-loaded.htm:23:33\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\n@http://web-platform.test:8000/XMLHttpRequest/event-readystatechange-loaded.htm:19:1\n"]]]}]
23:36:40 INFO - .
23:36:40 INFO - TEST-OK | /XMLHttpRequest/event-readystatechange-loaded.htm | took 6523ms
23:36:40 INFO - PROCESS | 3252 | 1477636600967 Marionette TRACE conn5 -> [0,137,"getWindowHandle",null]
23:36:40 INFO - PROCESS | 3252 | 1477636600972 Marionette TRACE conn5 <- [1,137,null,{"value":"13"}]
23:36:40 INFO - TEST-START | /XMLHttpRequest/event-timeout-order.htm
23:36:40 INFO - PROCESS | 3252 | 1477636600980 Marionette TRACE conn5 -> [0,138,"executeScript",{"scriptTimeout":null,"newSandbox":true,"args":[],"filename":"executormarionette.py","script":"if (window.wrappedJSObject.win) {window.wrappedJSObject.win.close()}","sandbox":"default","line":430}]
23:36:41 INFO - PROCESS | 3252 | 1477636601090 Marionette TRACE conn5 <- [1,138,null,{"value":null}]
23:36:41 INFO - PROCESS | 3252 | 1477636601097 Marionette TRACE conn5 -> [0,139,"getWindowHandles",null]
23:36:41 INFO - PROCESS | 3252 | 1477636601101 Marionette TRACE conn5 <- [1,139,null,["13"]]
23:36:41 INFO - PROCESS | 3252 | 1477636601106 Marionette TRACE conn5 -> [0,140,"switchToWindow",{"name":"13"}]
23:36:41 INFO - PROCESS | 3252 | 1477636601112 Marionette TRACE conn5 <- [1,140,null,{}]
23:36:41 INFO - PROCESS | 3252 | 1477636601201 addons.productaddons WARN Failed downloading XML, status: 0, reason: error
23:36:41 INFO - PROCESS | 3252 | 1477636601210 Marionette TRACE conn5 -> [0,141,"executeAsyncScript",{"scriptTimeout":null,"sandbox":"default","debug_script":false,"script":"/* This Source Code Form is subject to the terms of the Mozilla Public\n * License, v. 2.0. If a copy of the MPL was not distributed with this\n * file, You can obtain one at http://mozilla.org/MPL/2.0/. */\n\nwindow.wrappedJSObject.timeout_multiplier = 3;\nwindow.wrappedJSObject.explicit_timeout = 0;\n\nwindow.wrappedJSObject.addEventListener(\"message\", function listener(event) {\n if (event.data.type != \"complete\") {\n return;\n }\n window.wrappedJSObject.removeEventListener(\"message\", listener);\n clearTimeout(timer);\n var tests = event.data.tests;\n var status = event.data.status;\n\n var subtest_results = tests.map(function(x) {\n return [x.name, x.status, x.message, x.stack]\n });\n\n marionetteScriptFinished([\"/XMLHttpRequest/event-timeout-order.htm\",\n status.status,\n status.message,\n status.stack,\n subtest_results]);\n}, false);\n\nwindow.wrappedJSObject.win = window.open(\"http://web-platform.test:8000/XMLHttpRequest/event-timeout-order.htm\", \"9298bc64-aba3-4cf2-8943-12823d317f6b\");\n\nvar timer = null;\nif (30000) {\n timer = setTimeout(function() {\n log(\"Timeout fired\");\n window.wrappedJSObject.win.timeout();\n }, 30000);\n}\n","newSandbox":false,"line":445,"args":[],"filename":"executormarionette.py"}]
23:36:41 INFO - PROCESS | 3252 | ++DOCSHELL 000000E253046800 == 32 [pid = 3252] [id = 37]
23:36:41 INFO - PROCESS | 3252 | ++DOMWINDOW == 38 (000000E253047000) [pid = 3252] [serial = 108] [outer = 0000000000000000]
23:36:41 INFO - PROCESS | 3252 | ++DOMWINDOW == 39 (000000E25305D000) [pid = 3252] [serial = 109] [outer = 000000E253047000]
23:36:41 INFO - PROCESS | 3252 | 1477636601271 Marionette DEBUG loaded listener.js
23:36:41 INFO - PROCESS | 3252 | ++DOMWINDOW == 40 (000000E25335A000) [pid = 3252] [serial = 110] [outer = 000000E253047000]
23:36:41 INFO - PROCESS | 3252 | 1477636601598 Marionette TRACE conn5 <- [1,141,null,{"value":["/XMLHttpRequest/event-timeout-order.htm",0,null,null,[["XMLHttpRequest: event - timeout (order of events)",0,null,null]]]}]
23:36:41 INFO - .
23:36:41 INFO - TEST-OK | /XMLHttpRequest/event-timeout-order.htm | took 672ms
23:36:41 INFO - PROCESS | 3252 | 1477636601651 Marionette TRACE conn5 -> [0,142,"getWindowHandle",null]
23:36:41 INFO - PROCESS | 3252 | 1477636601655 Marionette TRACE conn5 <- [1,142,null,{"value":"13"}]
23:36:41 INFO - TEST-START | /XMLHttpRequest/event-timeout.htm
23:36:41 INFO - PROCESS | 3252 | 1477636601660 Marionette TRACE conn5 -> [0,143,"executeScript",{"scriptTimeout":null,"newSandbox":true,"args":[],"filename":"executormarionette.py","script":"if (window.wrappedJSObject.win) {window.wrappedJSObject.win.close()}","sandbox":"default","line":430}]
23:36:41 INFO - PROCESS | 3252 | 1477636601784 Marionette TRACE conn5 <- [1,143,null,{"value":null}]
23:36:41 INFO - PROCESS | 3252 | 1477636601792 Marionette TRACE conn5 -> [0,144,"getWindowHandles",null]
23:36:41 INFO - PROCESS | 3252 | 1477636601795 Marionette TRACE conn5 <- [1,144,null,["13"]]
23:36:41 INFO - PROCESS | 3252 | 1477636601799 Marionette TRACE conn5 -> [0,145,"switchToWindow",{"name":"13"}]
23:36:41 INFO - PROCESS | 3252 | 1477636601804 Marionette TRACE conn5 <- [1,145,null,{}]
23:36:41 INFO - PROCESS | 3252 | 1477636601808 Marionette TRACE conn5 -> [0,146,"executeAsyncScript",{"scriptTimeout":null,"sandbox":"default","debug_script":false,"script":"/* This Source Code Form is subject to the terms of the Mozilla Public\n * License, v. 2.0. If a copy of the MPL was not distributed with this\n * file, You can obtain one at http://mozilla.org/MPL/2.0/. */\n\nwindow.wrappedJSObject.timeout_multiplier = 3;\nwindow.wrappedJSObject.explicit_timeout = 0;\n\nwindow.wrappedJSObject.addEventListener(\"message\", function listener(event) {\n if (event.data.type != \"complete\") {\n return;\n }\n window.wrappedJSObject.removeEventListener(\"message\", listener);\n clearTimeout(timer);\n var tests = event.data.tests;\n var status = event.data.status;\n\n var subtest_results = tests.map(function(x) {\n return [x.name, x.status, x.message, x.stack]\n });\n\n marionetteScriptFinished([\"/XMLHttpRequest/event-timeout.htm\",\n status.status,\n status.message,\n status.stack,\n subtest_results]);\n}, false);\n\nwindow.wrappedJSObject.win = window.open(\"http://web-platform.test:8000/XMLHttpRequest/event-timeout.htm\", \"9298bc64-aba3-4cf2-8943-12823d317f6b\");\n\nvar timer = null;\nif (30000) {\n timer = setTimeout(function() {\n log(\"Timeout fired\");\n window.wrappedJSObject.win.timeout();\n }, 30000);\n}\n","newSandbox":false,"line":445,"args":[],"filename":"executormarionette.py"}]
23:36:41 INFO - PROCESS | 3252 | ++DOCSHELL 000000E254526000 == 33 [pid = 3252] [id = 38]
23:36:41 INFO - PROCESS | 3252 | ++DOMWINDOW == 41 (000000E256F06000) [pid = 3252] [serial = 111] [outer = 0000000000000000]
23:36:41 INFO - PROCESS | 3252 | ++DOMWINDOW == 42 (000000E256F1C800) [pid = 3252] [serial = 112] [outer = 000000E256F06000]
23:36:41 INFO - PROCESS | 3252 | 1477636601865 Marionette DEBUG loaded listener.js
23:36:41 INFO - PROCESS | 3252 | ++DOMWINDOW == 43 (000000E258114800) [pid = 3252] [serial = 113] [outer = 000000E256F06000]
23:36:42 INFO - PROCESS | 3252 | 1477636602226 Marionette TRACE conn5 <- [1,146,null,{"value":["/XMLHttpRequest/event-timeout.htm",0,null,null,[["XMLHttpRequest: timeout event",0,null,null]]]}]
23:36:42 INFO - .
23:36:42 INFO - TEST-OK | /XMLHttpRequest/event-timeout.htm | took 586ms
23:36:42 INFO - PROCESS | 3252 | 1477636602257 Marionette TRACE conn5 -> [0,147,"getWindowHandle",null]
23:36:42 INFO - PROCESS | 3252 | 1477636602263 Marionette TRACE conn5 <- [1,147,null,{"value":"13"}]
23:36:42 INFO - TEST-START | /XMLHttpRequest/event-upload-progress-crossorigin.sub.htm
23:36:42 INFO - PROCESS | 3252 | 1477636602267 Marionette TRACE conn5 -> [0,148,"executeScript",{"scriptTimeout":null,"newSandbox":true,"args":[],"filename":"executormarionette.py","script":"if (window.wrappedJSObject.win) {window.wrappedJSObject.win.close()}","sandbox":"default","line":430}]
23:36:42 INFO - PROCESS | 3252 | 1477636602372 Marionette TRACE conn5 <- [1,148,null,{"value":null}]
23:36:42 INFO - PROCESS | 3252 | 1477636602428 Marionette TRACE conn5 -> [0,149,"getWindowHandles",null]
23:36:42 INFO - PROCESS | 3252 | 1477636602431 Marionette TRACE conn5 <- [1,149,null,["13"]]
23:36:42 INFO - PROCESS | 3252 | 1477636602436 Marionette TRACE conn5 -> [0,150,"switchToWindow",{"name":"13"}]
23:36:42 INFO - PROCESS | 3252 | 1477636602441 Marionette TRACE conn5 <- [1,150,null,{}]
23:36:42 INFO - PROCESS | 3252 | 1477636602444 Marionette TRACE conn5 -> [0,151,"executeAsyncScript",{"scriptTimeout":null,"sandbox":"default","debug_script":false,"script":"/* This Source Code Form is subject to the terms of the Mozilla Public\n * License, v. 2.0. If a copy of the MPL was not distributed with this\n * file, You can obtain one at http://mozilla.org/MPL/2.0/. */\n\nwindow.wrappedJSObject.timeout_multiplier = 3;\nwindow.wrappedJSObject.explicit_timeout = 0;\n\nwindow.wrappedJSObject.addEventListener(\"message\", function listener(event) {\n if (event.data.type != \"complete\") {\n return;\n }\n window.wrappedJSObject.removeEventListener(\"message\", listener);\n clearTimeout(timer);\n var tests = event.data.tests;\n var status = event.data.status;\n\n var subtest_results = tests.map(function(x) {\n return [x.name, x.status, x.message, x.stack]\n });\n\n marionetteScriptFinished([\"/XMLHttpRequest/event-upload-progress-crossorigin.sub.htm\",\n status.status,\n status.message,\n status.stack,\n subtest_results]);\n}, false);\n\nwindow.wrappedJSObject.win = window.open(\"http://web-platform.test:8000/XMLHttpRequest/event-upload-progress-crossorigin.sub.htm\", \"9298bc64-aba3-4cf2-8943-12823d317f6b\");\n\nvar timer = null;\nif (30000) {\n timer = setTimeout(function() {\n log(\"Timeout fired\");\n window.wrappedJSObject.win.timeout();\n }, 30000);\n}\n","newSandbox":false,"line":445,"args":[],"filename":"executormarionette.py"}]
23:36:42 INFO - PROCESS | 3252 | ++DOCSHELL 000000E25A130000 == 34 [pid = 3252] [id = 39]
23:36:42 INFO - PROCESS | 3252 | ++DOMWINDOW == 44 (000000E25A131800) [pid = 3252] [serial = 114] [outer = 0000000000000000]
23:36:42 INFO - PROCESS | 3252 | ++DOMWINDOW == 45 (000000E25A2C3800) [pid = 3252] [serial = 115] [outer = 000000E25A131800]
23:36:42 INFO - PROCESS | 3252 | 1477636602503 Marionette DEBUG loaded listener.js
23:36:42 INFO - PROCESS | 3252 | ++DOMWINDOW == 46 (000000E25A9C6000) [pid = 3252] [serial = 116] [outer = 000000E25A131800]
23:36:42 INFO - PROCESS | 3252 | 1477636602819 Marionette TRACE conn5 <- [1,151,null,{"value":["/XMLHttpRequest/event-upload-progress-crossorigin.sub.htm",0,null,null,[["XMLHttpRequest: upload progress event for cross-origin requests",0,null,null]]]}]
23:36:42 INFO - .
23:36:42 INFO - TEST-OK | /XMLHttpRequest/event-upload-progress-crossorigin.sub.htm | took 585ms
23:36:42 INFO - PROCESS | 3252 | 1477636602855 Marionette TRACE conn5 -> [0,152,"getWindowHandle",null]
23:36:42 INFO - PROCESS | 3252 | 1477636602859 Marionette TRACE conn5 <- [1,152,null,{"value":"13"}]
23:36:42 INFO - TEST-START | /XMLHttpRequest/event-upload-progress.htm
23:36:42 INFO - PROCESS | 3252 | 1477636602863 Marionette TRACE conn5 -> [0,153,"executeScript",{"scriptTimeout":null,"newSandbox":true,"args":[],"filename":"executormarionette.py","script":"if (window.wrappedJSObject.win) {window.wrappedJSObject.win.close()}","sandbox":"default","line":430}]
23:36:42 INFO - PROCESS | 3252 | 1477636602958 Marionette TRACE conn5 <- [1,153,null,{"value":null}]
23:36:43 INFO - PROCESS | 3252 | 1477636603012 Marionette TRACE conn5 -> [0,154,"getWindowHandles",null]
23:36:43 INFO - PROCESS | 3252 | 1477636603015 Marionette TRACE conn5 <- [1,154,null,["13"]]
23:36:43 INFO - PROCESS | 3252 | 1477636603018 Marionette TRACE conn5 -> [0,155,"switchToWindow",{"name":"13"}]
23:36:43 INFO - PROCESS | 3252 | 1477636603022 Marionette TRACE conn5 <- [1,155,null,{}]
23:36:43 INFO - PROCESS | 3252 | 1477636603025 Marionette TRACE conn5 -> [0,156,"executeAsyncScript",{"scriptTimeout":null,"sandbox":"default","debug_script":false,"script":"/* This Source Code Form is subject to the terms of the Mozilla Public\n * License, v. 2.0. If a copy of the MPL was not distributed with this\n * file, You can obtain one at http://mozilla.org/MPL/2.0/. */\n\nwindow.wrappedJSObject.timeout_multiplier = 3;\nwindow.wrappedJSObject.explicit_timeout = 0;\n\nwindow.wrappedJSObject.addEventListener(\"message\", function listener(event) {\n if (event.data.type != \"complete\") {\n return;\n }\n window.wrappedJSObject.removeEventListener(\"message\", listener);\n clearTimeout(timer);\n var tests = event.data.tests;\n var status = event.data.status;\n\n var subtest_results = tests.map(function(x) {\n return [x.name, x.status, x.message, x.stack]\n });\n\n marionetteScriptFinished([\"/XMLHttpRequest/event-upload-progress.htm\",\n status.status,\n status.message,\n status.stack,\n subtest_results]);\n}, false);\n\nwindow.wrappedJSObject.win = window.open(\"http://web-platform.test:8000/XMLHttpRequest/event-upload-progress.htm\", \"9298bc64-aba3-4cf2-8943-12823d317f6b\");\n\nvar timer = null;\nif (30000) {\n timer = setTimeout(function() {\n log(\"Timeout fired\");\n window.wrappedJSObject.win.timeout();\n }, 30000);\n}\n","newSandbox":false,"line":445,"args":[],"filename":"executormarionette.py"}]
23:36:43 INFO - PROCESS | 3252 | ++DOCSHELL 000000E25AEDD800 == 35 [pid = 3252] [id = 40]
23:36:43 INFO - PROCESS | 3252 | ++DOMWINDOW == 47 (000000E25AEDF000) [pid = 3252] [serial = 117] [outer = 0000000000000000]
23:36:43 INFO - PROCESS | 3252 | ++DOMWINDOW == 48 (000000E25AEE7800) [pid = 3252] [serial = 118] [outer = 000000E25AEDF000]
23:36:43 INFO - PROCESS | 3252 | 1477636603081 Marionette DEBUG loaded listener.js
23:36:43 INFO - PROCESS | 3252 | ++DOMWINDOW == 49 (000000E25AF86000) [pid = 3252] [serial = 119] [outer = 000000E25AEDF000]
23:36:43 INFO - PROCESS | 3252 | 1477636603406 Marionette TRACE conn5 <- [1,156,null,{"value":["/XMLHttpRequest/event-upload-progress.htm",0,null,null,[["XMLHttpRequest: upload progress event",0,null,null]]]}]
23:36:43 INFO - .
23:36:43 INFO - TEST-OK | /XMLHttpRequest/event-upload-progress.htm | took 586ms
23:36:43 INFO - PROCESS | 3252 | 1477636603452 Marionette TRACE conn5 -> [0,157,"getWindowHandle",null]
23:36:43 INFO - PROCESS | 3252 | 1477636603458 Marionette TRACE conn5 <- [1,157,null,{"value":"13"}]
23:36:43 INFO - TEST-START | /XMLHttpRequest/formdata-blob.htm
23:36:43 INFO - PROCESS | 3252 | 1477636603466 Marionette TRACE conn5 -> [0,158,"executeScript",{"scriptTimeout":null,"newSandbox":true,"args":[],"filename":"executormarionette.py","script":"if (window.wrappedJSObject.win) {window.wrappedJSObject.win.close()}","sandbox":"default","line":430}]
23:36:43 INFO - PROCESS | 3252 | 1477636603632 Marionette TRACE conn5 <- [1,158,null,{"value":null}]
23:36:43 INFO - PROCESS | 3252 | 1477636603689 Marionette TRACE conn5 -> [0,159,"getWindowHandles",null]
23:36:43 INFO - PROCESS | 3252 | 1477636603699 Marionette TRACE conn5 <- [1,159,null,["13"]]
23:36:43 INFO - PROCESS | 3252 | 1477636603704 Marionette TRACE conn5 -> [0,160,"switchToWindow",{"name":"13"}]
23:36:43 INFO - PROCESS | 3252 | 1477636603711 Marionette TRACE conn5 <- [1,160,null,{}]
23:36:43 INFO - PROCESS | 3252 | 1477636603758 Marionette TRACE conn5 -> [0,161,"executeAsyncScript",{"scriptTimeout":null,"sandbox":"default","debug_script":false,"script":"/* This Source Code Form is subject to the terms of the Mozilla Public\n * License, v. 2.0. If a copy of the MPL was not distributed with this\n * file, You can obtain one at http://mozilla.org/MPL/2.0/. */\n\nwindow.wrappedJSObject.timeout_multiplier = 3;\nwindow.wrappedJSObject.explicit_timeout = 0;\n\nwindow.wrappedJSObject.addEventListener(\"message\", function listener(event) {\n if (event.data.type != \"complete\") {\n return;\n }\n window.wrappedJSObject.removeEventListener(\"message\", listener);\n clearTimeout(timer);\n var tests = event.data.tests;\n var status = event.data.status;\n\n var subtest_results = tests.map(function(x) {\n return [x.name, x.status, x.message, x.stack]\n });\n\n marionetteScriptFinished([\"/XMLHttpRequest/formdata-blob.htm\",\n status.status,\n status.message,\n status.stack,\n subtest_results]);\n}, false);\n\nwindow.wrappedJSObject.win = window.open(\"http://web-platform.test:8000/XMLHttpRequest/formdata-blob.htm\", \"9298bc64-aba3-4cf2-8943-12823d317f6b\");\n\nvar timer = null;\nif (30000) {\n timer = setTimeout(function() {\n log(\"Timeout fired\");\n window.wrappedJSObject.win.timeout();\n }, 30000);\n}\n","newSandbox":false,"line":445,"args":[],"filename":"executormarionette.py"}]
23:36:43 INFO - PROCESS | 3252 | ++DOCSHELL 000000E25326A800 == 36 [pid = 3252] [id = 41]
23:36:43 INFO - PROCESS | 3252 | ++DOMWINDOW == 50 (000000E253272000) [pid = 3252] [serial = 120] [outer = 0000000000000000]
23:36:43 INFO - PROCESS | 3252 | ++DOMWINDOW == 51 (000000E254315000) [pid = 3252] [serial = 121] [outer = 000000E253272000]
23:36:43 INFO - PROCESS | 3252 | 1477636603836 Marionette DEBUG loaded listener.js
23:36:43 INFO - PROCESS | 3252 | ++DOMWINDOW == 52 (000000E25451F800) [pid = 3252] [serial = 122] [outer = 000000E253272000]
23:36:44 INFO - PROCESS | 3252 | 1477636604262 Marionette TRACE conn5 <- [1,161,null,{"value":["/XMLHttpRequest/formdata-blob.htm",0,null,null,[["formdata with blob",0,null,null],["formdata with named blob",0,null,null],["formdata.append() should throw if value is string and file name is given",0,null,null]]]}]
23:36:44 INFO - ...
23:36:44 INFO - TEST-OK | /XMLHttpRequest/formdata-blob.htm | took 839ms
23:36:44 INFO - PROCESS | 3252 | 1477636604305 Marionette TRACE conn5 -> [0,162,"getWindowHandle",null]
23:36:44 INFO - PROCESS | 3252 | 1477636604309 Marionette TRACE conn5 <- [1,162,null,{"value":"13"}]
23:36:44 INFO - TEST-START | /XMLHttpRequest/formdata-delete.htm
23:36:44 INFO - PROCESS | 3252 | 1477636604314 Marionette TRACE conn5 -> [0,163,"executeScript",{"scriptTimeout":null,"newSandbox":true,"args":[],"filename":"executormarionette.py","script":"if (window.wrappedJSObject.win) {window.wrappedJSObject.win.close()}","sandbox":"default","line":430}]
23:36:44 INFO - PROCESS | 3252 | 1477636604467 Marionette TRACE conn5 <- [1,163,null,{"value":null}]
23:36:44 INFO - PROCESS | 3252 | 1477636604523 Marionette TRACE conn5 -> [0,164,"getWindowHandles",null]
23:36:44 INFO - PROCESS | 3252 | 1477636604526 Marionette TRACE conn5 <- [1,164,null,["13"]]
23:36:44 INFO - PROCESS | 3252 | 1477636604530 Marionette TRACE conn5 -> [0,165,"switchToWindow",{"name":"13"}]
23:36:44 INFO - PROCESS | 3252 | 1477636604535 Marionette TRACE conn5 <- [1,165,null,{}]
23:36:44 INFO - PROCESS | 3252 | 1477636604539 Marionette TRACE conn5 -> [0,166,"executeAsyncScript",{"scriptTimeout":null,"sandbox":"default","debug_script":false,"script":"/* This Source Code Form is subject to the terms of the Mozilla Public\n * License, v. 2.0. If a copy of the MPL was not distributed with this\n * file, You can obtain one at http://mozilla.org/MPL/2.0/. */\n\nwindow.wrappedJSObject.timeout_multiplier = 3;\nwindow.wrappedJSObject.explicit_timeout = 0;\n\nwindow.wrappedJSObject.addEventListener(\"message\", function listener(event) {\n if (event.data.type != \"complete\") {\n return;\n }\n window.wrappedJSObject.removeEventListener(\"message\", listener);\n clearTimeout(timer);\n var tests = event.data.tests;\n var status = event.data.status;\n\n var subtest_results = tests.map(function(x) {\n return [x.name, x.status, x.message, x.stack]\n });\n\n marionetteScriptFinished([\"/XMLHttpRequest/formdata-delete.htm\",\n status.status,\n status.message,\n status.stack,\n subtest_results]);\n}, false);\n\nwindow.wrappedJSObject.win = window.open(\"http://web-platform.test:8000/XMLHttpRequest/formdata-delete.htm\", \"9298bc64-aba3-4cf2-8943-12823d317f6b\");\n\nvar timer = null;\nif (30000) {\n timer = setTimeout(function() {\n log(\"Timeout fired\");\n window.wrappedJSObject.win.timeout();\n }, 30000);\n}\n","newSandbox":false,"line":445,"args":[],"filename":"executormarionette.py"}]
23:36:44 INFO - PROCESS | 3252 | ++DOCSHELL 000000E25AEE8800 == 37 [pid = 3252] [id = 42]
23:36:44 INFO - PROCESS | 3252 | ++DOMWINDOW == 53 (000000E25AEEA800) [pid = 3252] [serial = 123] [outer = 0000000000000000]
23:36:44 INFO - PROCESS | 3252 | ++DOMWINDOW == 54 (000000E25B14D000) [pid = 3252] [serial = 124] [outer = 000000E25AEEA800]
23:36:44 INFO - PROCESS | 3252 | 1477636604647 Marionette DEBUG loaded listener.js
23:36:44 INFO - PROCESS | 3252 | ++DOMWINDOW == 55 (000000E25B62F000) [pid = 3252] [serial = 125] [outer = 000000E25AEEA800]
23:36:45 INFO - PROCESS | 3252 | 1477636605063 Marionette TRACE conn5 <- [1,166,null,{"value":["/XMLHttpRequest/formdata-delete.htm",0,null,null,[["testFormDataDelete",0,null,null],["testFormDataDeleteFromForm",0,null,null],["testFormDataDeleteFromFormNonExistentKey",0,null,null],["testFormDataDeleteFromFormOtherKey",0,null,null],["testFormDataDeleteFromEmptyForm",0,null,null],["testFormDataDeleteNonExistentKey",0,null,null],["testFormDataDeleteOtherKey",0,null,null]]]}]
23:36:45 INFO - .......
23:36:45 INFO - TEST-OK | /XMLHttpRequest/formdata-delete.htm | took 775ms
23:36:45 INFO - PROCESS | 3252 | 1477636605101 Marionette TRACE conn5 -> [0,167,"getWindowHandle",null]
23:36:45 INFO - PROCESS | 3252 | 1477636605107 Marionette TRACE conn5 <- [1,167,null,{"value":"13"}]
23:36:45 INFO - TEST-START | /XMLHttpRequest/formdata-foreach.html
23:36:45 INFO - PROCESS | 3252 | 1477636605112 Marionette TRACE conn5 -> [0,168,"executeScript",{"scriptTimeout":null,"newSandbox":true,"args":[],"filename":"executormarionette.py","script":"if (window.wrappedJSObject.win) {window.wrappedJSObject.win.close()}","sandbox":"default","line":430}]
23:36:45 INFO - PROCESS | 3252 | 1477636605233 Marionette TRACE conn5 <- [1,168,null,{"value":null}]
23:36:45 INFO - PROCESS | 3252 | 1477636605290 Marionette TRACE conn5 -> [0,169,"getWindowHandles",null]
23:36:45 INFO - PROCESS | 3252 | 1477636605293 Marionette TRACE conn5 <- [1,169,null,["13"]]
23:36:45 INFO - PROCESS | 3252 | 1477636605297 Marionette TRACE conn5 -> [0,170,"switchToWindow",{"name":"13"}]
23:36:45 INFO - PROCESS | 3252 | 1477636605302 Marionette TRACE conn5 <- [1,170,null,{}]
23:36:45 INFO - PROCESS | 3252 | 1477636605306 Marionette TRACE conn5 -> [0,171,"executeAsyncScript",{"scriptTimeout":null,"sandbox":"default","debug_script":false,"script":"/* This Source Code Form is subject to the terms of the Mozilla Public\n * License, v. 2.0. If a copy of the MPL was not distributed with this\n * file, You can obtain one at http://mozilla.org/MPL/2.0/. */\n\nwindow.wrappedJSObject.timeout_multiplier = 3;\nwindow.wrappedJSObject.explicit_timeout = 0;\n\nwindow.wrappedJSObject.addEventListener(\"message\", function listener(event) {\n if (event.data.type != \"complete\") {\n return;\n }\n window.wrappedJSObject.removeEventListener(\"message\", listener);\n clearTimeout(timer);\n var tests = event.data.tests;\n var status = event.data.status;\n\n var subtest_results = tests.map(function(x) {\n return [x.name, x.status, x.message, x.stack]\n });\n\n marionetteScriptFinished([\"/XMLHttpRequest/formdata-foreach.html\",\n status.status,\n status.message,\n status.stack,\n subtest_results]);\n}, false);\n\nwindow.wrappedJSObject.win = window.open(\"http://web-platform.test:8000/XMLHttpRequest/formdata-foreach.html\", \"9298bc64-aba3-4cf2-8943-12823d317f6b\");\n\nvar timer = null;\nif (30000) {\n timer = setTimeout(function() {\n log(\"Timeout fired\");\n window.wrappedJSObject.win.timeout();\n }, 30000);\n}\n","newSandbox":false,"line":445,"args":[],"filename":"executormarionette.py"}]
23:36:45 INFO - PROCESS | 3252 | ++DOCSHELL 000000E25C21B800 == 38 [pid = 3252] [id = 43]
23:36:45 INFO - PROCESS | 3252 | ++DOMWINDOW == 56 (000000E25C222000) [pid = 3252] [serial = 126] [outer = 0000000000000000]
23:36:45 INFO - PROCESS | 3252 | ++DOMWINDOW == 57 (000000E25D872000) [pid = 3252] [serial = 127] [outer = 000000E25C222000]
23:36:45 INFO - PROCESS | 3252 | 1477636605378 Marionette DEBUG loaded listener.js
23:36:45 INFO - PROCESS | 3252 | ++DOMWINDOW == 58 (000000E25DE0A000) [pid = 3252] [serial = 128] [outer = 000000E25C222000]
23:36:45 INFO - PROCESS | 3252 | 1477636605807 Marionette TRACE conn5 <- [1,171,null,{"value":["/XMLHttpRequest/formdata-foreach.html",0,null,null,[["Iterator should return duplicate keys and non-deleted values",0,null,null],["Entries iterator should return duplicate keys and non-deleted values",0,null,null],["Keys iterator should return duplicates",0,null,null],["Values iterator should return non-deleted values",0,null,null]]]}]
23:36:45 INFO - ....
23:36:45 INFO - TEST-OK | /XMLHttpRequest/formdata-foreach.html | took 733ms
23:36:45 INFO - PROCESS | 3252 | 1477636605847 Marionette TRACE conn5 -> [0,172,"getWindowHandle",null]
23:36:45 INFO - TEST-START | /XMLHttpRequest/formdata-get.htm
23:36:45 INFO - PROCESS | 3252 | 1477636605851 Marionette TRACE conn5 <- [1,172,null,{"value":"13"}]
23:36:45 INFO - PROCESS | 3252 | 1477636605856 Marionette TRACE conn5 -> [0,173,"executeScript",{"scriptTimeout":null,"newSandbox":true,"args":[],"filename":"executormarionette.py","script":"if (window.wrappedJSObject.win) {window.wrappedJSObject.win.close()}","sandbox":"default","line":430}]
23:36:45 INFO - PROCESS | 3252 | 1477636605971 Marionette TRACE conn5 <- [1,173,null,{"value":null}]
23:36:46 INFO - PROCESS | 3252 | 1477636606028 Marionette TRACE conn5 -> [0,174,"getWindowHandles",null]
23:36:46 INFO - PROCESS | 3252 | 1477636606031 Marionette TRACE conn5 <- [1,174,null,["13"]]
23:36:46 INFO - PROCESS | 3252 | 1477636606035 Marionette TRACE conn5 -> [0,175,"switchToWindow",{"name":"13"}]
23:36:46 INFO - PROCESS | 3252 | 1477636606039 Marionette TRACE conn5 <- [1,175,null,{}]
23:36:46 INFO - PROCESS | 3252 | 1477636606043 Marionette TRACE conn5 -> [0,176,"executeAsyncScript",{"scriptTimeout":null,"sandbox":"default","debug_script":false,"script":"/* This Source Code Form is subject to the terms of the Mozilla Public\n * License, v. 2.0. If a copy of the MPL was not distributed with this\n * file, You can obtain one at http://mozilla.org/MPL/2.0/. */\n\nwindow.wrappedJSObject.timeout_multiplier = 3;\nwindow.wrappedJSObject.explicit_timeout = 0;\n\nwindow.wrappedJSObject.addEventListener(\"message\", function listener(event) {\n if (event.data.type != \"complete\") {\n return;\n }\n window.wrappedJSObject.removeEventListener(\"message\", listener);\n clearTimeout(timer);\n var tests = event.data.tests;\n var status = event.data.status;\n\n var subtest_results = tests.map(function(x) {\n return [x.name, x.status, x.message, x.stack]\n });\n\n marionetteScriptFinished([\"/XMLHttpRequest/formdata-get.htm\",\n status.status,\n status.message,\n status.stack,\n subtest_results]);\n}, false);\n\nwindow.wrappedJSObject.win = window.open(\"http://web-platform.test:8000/XMLHttpRequest/formdata-get.htm\", \"9298bc64-aba3-4cf2-8943-12823d317f6b\");\n\nvar timer = null;\nif (30000) {\n timer = setTimeout(function() {\n log(\"Timeout fired\");\n window.wrappedJSObject.win.timeout();\n }, 30000);\n}\n","newSandbox":false,"line":445,"args":[],"filename":"executormarionette.py"}]
23:36:46 INFO - PROCESS | 3252 | ++DOCSHELL 000000E25F583000 == 39 [pid = 3252] [id = 44]
23:36:46 INFO - PROCESS | 3252 | ++DOMWINDOW == 59 (000000E25F583800) [pid = 3252] [serial = 129] [outer = 0000000000000000]
23:36:46 INFO - PROCESS | 3252 | ++DOMWINDOW == 60 (000000E25F58E800) [pid = 3252] [serial = 130] [outer = 000000E25F583800]
23:36:46 INFO - PROCESS | 3252 | 1477636606109 Marionette DEBUG loaded listener.js
23:36:46 INFO - PROCESS | 3252 | ++DOMWINDOW == 61 (000000E260266800) [pid = 3252] [serial = 131] [outer = 000000E25F583800]
23:36:46 INFO - PROCESS | 3252 | [3252] WARNING: 'NS_FAILED(aResult)', file c:/builds/moz2_slave/fx-team-w64-d-0000000000000000/build/src/netwerk/cache2/CacheFile.cpp, line 666
23:36:46 INFO - PROCESS | 3252 | 1477636606559 Marionette TRACE conn5 <- [1,176,null,{"value":["/XMLHttpRequest/formdata-get.htm",0,null,null,[["testFormDataGet",0,null,null],["testFormDataGetFromForm",0,null,null],["testFormDataGetFromFormNull",0,null,null],["testFormDataGetFromEmptyForm",0,null,null],["testFormDataGetNull1",0,null,null],["testFormDataGetNull2",0,null,null],["testFormDataGetAll",0,null,null],["testFormDataGetAllEmpty1",0,null,null],["testFormDataGetAllEmpty2",0,null,null],["testFormDataGetAllFromForm",0,null,null],["testFormDataGetAllFromFormNull",0,null,null],["testFormDataGetAllFromEmptyForm",0,null,null]]]}]
23:36:46 INFO - ............
23:36:46 INFO - TEST-OK | /XMLHttpRequest/formdata-get.htm | took 733ms
23:36:46 INFO - PROCESS | 3252 | 1477636606589 Marionette TRACE conn5 -> [0,177,"getWindowHandle",null]
23:36:46 INFO - PROCESS | 3252 | 1477636606592 Marionette TRACE conn5 <- [1,177,null,{"value":"13"}]
23:36:46 INFO - TEST-START | /XMLHttpRequest/formdata-has.htm
23:36:46 INFO - PROCESS | 3252 | 1477636606596 Marionette TRACE conn5 -> [0,178,"executeScript",{"scriptTimeout":null,"newSandbox":true,"args":[],"filename":"executormarionette.py","script":"if (window.wrappedJSObject.win) {window.wrappedJSObject.win.close()}","sandbox":"default","line":430}]
23:36:46 INFO - PROCESS | 3252 | 1477636606702 Marionette TRACE conn5 <- [1,178,null,{"value":null}]
23:36:46 INFO - PROCESS | 3252 | 1477636606757 Marionette TRACE conn5 -> [0,179,"getWindowHandles",null]
23:36:46 INFO - PROCESS | 3252 | 1477636606760 Marionette TRACE conn5 <- [1,179,null,["13"]]
23:36:46 INFO - PROCESS | 3252 | 1477636606763 Marionette TRACE conn5 -> [0,180,"switchToWindow",{"name":"13"}]
23:36:46 INFO - PROCESS | 3252 | 1477636606768 Marionette TRACE conn5 <- [1,180,null,{}]
23:36:46 INFO - PROCESS | 3252 | 1477636606771 Marionette TRACE conn5 -> [0,181,"executeAsyncScript",{"scriptTimeout":null,"sandbox":"default","debug_script":false,"script":"/* This Source Code Form is subject to the terms of the Mozilla Public\n * License, v. 2.0. If a copy of the MPL was not distributed with this\n * file, You can obtain one at http://mozilla.org/MPL/2.0/. */\n\nwindow.wrappedJSObject.timeout_multiplier = 3;\nwindow.wrappedJSObject.explicit_timeout = 0;\n\nwindow.wrappedJSObject.addEventListener(\"message\", function listener(event) {\n if (event.data.type != \"complete\") {\n return;\n }\n window.wrappedJSObject.removeEventListener(\"message\", listener);\n clearTimeout(timer);\n var tests = event.data.tests;\n var status = event.data.status;\n\n var subtest_results = tests.map(function(x) {\n return [x.name, x.status, x.message, x.stack]\n });\n\n marionetteScriptFinished([\"/XMLHttpRequest/formdata-has.htm\",\n status.status,\n status.message,\n status.stack,\n subtest_results]);\n}, false);\n\nwindow.wrappedJSObject.win = window.open(\"http://web-platform.test:8000/XMLHttpRequest/formdata-has.htm\", \"9298bc64-aba3-4cf2-8943-12823d317f6b\");\n\nvar timer = null;\nif (30000) {\n timer = setTimeout(function() {\n log(\"Timeout fired\");\n window.wrappedJSObject.win.timeout();\n }, 30000);\n}\n","newSandbox":false,"line":445,"args":[],"filename":"executormarionette.py"}]
23:36:46 INFO - PROCESS | 3252 | ++DOCSHELL 000000E25AED8000 == 40 [pid = 3252] [id = 45]
23:36:46 INFO - PROCESS | 3252 | ++DOMWINDOW == 62 (000000E25B390000) [pid = 3252] [serial = 132] [outer = 0000000000000000]
23:36:46 INFO - PROCESS | 3252 | ++DOMWINDOW == 63 (000000E2604C6800) [pid = 3252] [serial = 133] [outer = 000000E25B390000]
23:36:46 INFO - PROCESS | 3252 | 1477636606836 Marionette DEBUG loaded listener.js
23:36:46 INFO - PROCESS | 3252 | ++DOMWINDOW == 64 (000000E260E9F000) [pid = 3252] [serial = 134] [outer = 000000E25B390000]
23:36:47 INFO - PROCESS | 3252 | 1477636607300 Marionette TRACE conn5 <- [1,181,null,{"value":["/XMLHttpRequest/formdata-has.htm",0,null,null,[["testFormDataHas",0,null,null],["testFormDataHasFromForm",0,null,null],["testFormDataHasFromFormNull",0,null,null],["testFormDataHasFromEmptyForm",0,null,null],["testFormDataHasEmpty1",0,null,null],["testFormDataHasEmpty2",0,null,null]]]}]
23:36:47 INFO - ......
23:36:47 INFO - TEST-OK | /XMLHttpRequest/formdata-has.htm | took 734ms
23:36:47 INFO - PROCESS | 3252 | 1477636607333 Marionette TRACE conn5 -> [0,182,"getWindowHandle",null]
23:36:47 INFO - PROCESS | 3252 | 1477636607337 Marionette TRACE conn5 <- [1,182,null,{"value":"13"}]
23:36:47 INFO - TEST-START | /XMLHttpRequest/formdata-set.htm
23:36:47 INFO - PROCESS | 3252 | 1477636607345 Marionette TRACE conn5 -> [0,183,"executeScript",{"scriptTimeout":null,"newSandbox":true,"args":[],"filename":"executormarionette.py","script":"if (window.wrappedJSObject.win) {window.wrappedJSObject.win.close()}","sandbox":"default","line":430}]
23:36:47 INFO - PROCESS | 3252 | 1477636607515 Marionette TRACE conn5 <- [1,183,null,{"value":null}]
23:36:47 INFO - PROCESS | 3252 | 1477636607576 Marionette TRACE conn5 -> [0,184,"getWindowHandles",null]
23:36:47 INFO - PROCESS | 3252 | 1477636607579 Marionette TRACE conn5 <- [1,184,null,["13"]]
23:36:47 INFO - PROCESS | 3252 | 1477636607583 Marionette TRACE conn5 -> [0,185,"switchToWindow",{"name":"13"}]
23:36:47 INFO - PROCESS | 3252 | 1477636607588 Marionette TRACE conn5 <- [1,185,null,{}]
23:36:47 INFO - PROCESS | 3252 | 1477636607594 Marionette TRACE conn5 -> [0,186,"executeAsyncScript",{"scriptTimeout":null,"sandbox":"default","debug_script":false,"script":"/* This Source Code Form is subject to the terms of the Mozilla Public\n * License, v. 2.0. If a copy of the MPL was not distributed with this\n * file, You can obtain one at http://mozilla.org/MPL/2.0/. */\n\nwindow.wrappedJSObject.timeout_multiplier = 3;\nwindow.wrappedJSObject.explicit_timeout = 0;\n\nwindow.wrappedJSObject.addEventListener(\"message\", function listener(event) {\n if (event.data.type != \"complete\") {\n return;\n }\n window.wrappedJSObject.removeEventListener(\"message\", listener);\n clearTimeout(timer);\n var tests = event.data.tests;\n var status = event.data.status;\n\n var subtest_results = tests.map(function(x) {\n return [x.name, x.status, x.message, x.stack]\n });\n\n marionetteScriptFinished([\"/XMLHttpRequest/formdata-set.htm\",\n status.status,\n status.message,\n status.stack,\n subtest_results]);\n}, false);\n\nwindow.wrappedJSObject.win = window.open(\"http://web-platform.test:8000/XMLHttpRequest/formdata-set.htm\", \"9298bc64-aba3-4cf2-8943-12823d317f6b\");\n\nvar timer = null;\nif (30000) {\n timer = setTimeout(function() {\n log(\"Timeout fired\");\n window.wrappedJSObject.win.timeout();\n }, 30000);\n}\n","newSandbox":false,"line":445,"args":[],"filename":"executormarionette.py"}]
23:36:47 INFO - PROCESS | 3252 | ++DOCSHELL 000000E25292C800 == 41 [pid = 3252] [id = 46]
23:36:47 INFO - PROCESS | 3252 | ++DOMWINDOW == 65 (000000E252AB1000) [pid = 3252] [serial = 135] [outer = 0000000000000000]
23:36:47 INFO - PROCESS | 3252 | ++DOMWINDOW == 66 (000000E2534AB000) [pid = 3252] [serial = 136] [outer = 000000E252AB1000]
23:36:47 INFO - PROCESS | 3252 | 1477636607657 Marionette DEBUG loaded listener.js
23:36:47 INFO - PROCESS | 3252 | ++DOMWINDOW == 67 (000000E254516000) [pid = 3252] [serial = 137] [outer = 000000E252AB1000]
23:36:47 INFO - PROCESS | 3252 | --DOCSHELL 000000E25A130000 == 40 [pid = 3252] [id = 39]
23:36:47 INFO - PROCESS | 3252 | --DOCSHELL 000000E254526000 == 39 [pid = 3252] [id = 38]
23:36:47 INFO - PROCESS | 3252 | --DOCSHELL 000000E253046800 == 38 [pid = 3252] [id = 37]
23:36:47 INFO - PROCESS | 3252 | --DOMWINDOW == 66 (000000E25E17A000) [pid = 3252] [serial = 104] [outer = 0000000000000000] [url = about:blank]
23:36:47 INFO - PROCESS | 3252 | --DOMWINDOW == 65 (000000E25E18A000) [pid = 3252] [serial = 103] [outer = 0000000000000000] [url = about:blank]
23:36:47 INFO - PROCESS | 3252 | --DOMWINDOW == 64 (000000E25B617000) [pid = 3252] [serial = 100] [outer = 0000000000000000] [url = about:blank]
23:36:47 INFO - PROCESS | 3252 | --DOMWINDOW == 63 (000000E25BB9C000) [pid = 3252] [serial = 101] [outer = 0000000000000000] [url = about:blank]
23:36:47 INFO - PROCESS | 3252 | --DOMWINDOW == 62 (000000E25810E000) [pid = 3252] [serial = 97] [outer = 0000000000000000] [url = about:blank]
23:36:47 INFO - PROCESS | 3252 | --DOMWINDOW == 61 (000000E25A2C4800) [pid = 3252] [serial = 98] [outer = 0000000000000000] [url = about:blank]
23:36:47 INFO - PROCESS | 3252 | --DOMWINDOW == 60 (000000E254316800) [pid = 3252] [serial = 94] [outer = 0000000000000000] [url = about:blank]
23:36:47 INFO - PROCESS | 3252 | --DOMWINDOW == 59 (000000E25817F800) [pid = 3252] [serial = 95] [outer = 0000000000000000] [url = about:blank]
23:36:47 INFO - PROCESS | 3252 | --DOMWINDOW == 58 (000000E260D97000) [pid = 3252] [serial = 91] [outer = 0000000000000000] [url = about:blank]
23:36:47 INFO - PROCESS | 3252 | --DOMWINDOW == 57 (000000E260DB6800) [pid = 3252] [serial = 92] [outer = 0000000000000000] [url = about:blank]
23:36:47 INFO - PROCESS | 3252 | --DOMWINDOW == 56 (000000E25F9E2800) [pid = 3252] [serial = 88] [outer = 0000000000000000] [url = about:blank]
23:36:47 INFO - PROCESS | 3252 | --DOMWINDOW == 55 (000000E25B376800) [pid = 3252] [serial = 89] [outer = 0000000000000000] [url = about:blank]
23:36:47 INFO - PROCESS | 3252 | --DOMWINDOW == 54 (000000E25A9CB000) [pid = 3252] [serial = 85] [outer = 0000000000000000] [url = about:blank]
23:36:47 INFO - PROCESS | 3252 | --DOMWINDOW == 53 (000000E25A9CF000) [pid = 3252] [serial = 86] [outer = 0000000000000000] [url = about:blank]
23:36:47 INFO - PROCESS | 3252 | --DOMWINDOW == 52 (000000E2536A2000) [pid = 3252] [serial = 82] [outer = 0000000000000000] [url = about:blank]
23:36:47 INFO - PROCESS | 3252 | --DOMWINDOW == 51 (000000E254517000) [pid = 3252] [serial = 83] [outer = 0000000000000000] [url = about:blank]
23:36:47 INFO - PROCESS | 3252 | --DOMWINDOW == 50 (000000E2604D2800) [pid = 3252] [serial = 80] [outer = 0000000000000000] [url = about:blank]
23:36:47 INFO - PROCESS | 3252 | --DOMWINDOW == 49 (000000E260DB2800) [pid = 3252] [serial = 106] [outer = 0000000000000000] [url = about:blank]
23:36:48 INFO - PROCESS | 3252 | 1477636608026 Marionette TRACE conn5 <- [1,186,null,{"value":["/XMLHttpRequest/formdata-set.htm",0,null,null,[["Passing a String object to FormData.set should work",0,null,null],["testFormDataSet1",0,null,null],["testFormDataSet2",0,null,null],["testFormDataSetUndefined1",0,null,null],["testFormDataSetUndefined2",0,null,null],["testFormDataSetNull1",0,null,null],["testFormDataSetNull2",0,null,null],["testFormDataSetToForm1",0,null,null],["testFormDataSetToForm2",0,null,null],["testFormDataSetToFormUndefined1",0,null,null],["testFormDataSetToFormUndefined2",0,null,null],["testFormDataSetToFormNull1",0,null,null],["testFormDataSetToFormNull2",0,null,null],["testFormDataSetEmptyBlob",0,null,null]]]}]
23:36:48 INFO - ..............
23:36:48 INFO - TEST-OK | /XMLHttpRequest/formdata-set.htm | took 734ms
23:36:48 INFO - PROCESS | 3252 | 1477636608080 Marionette TRACE conn5 -> [0,187,"getWindowHandle",null]
23:36:48 INFO - PROCESS | 3252 | 1477636608084 Marionette TRACE conn5 <- [1,187,null,{"value":"13"}]
23:36:48 INFO - PROCESS | 3252 | 1477636608089 Marionette TRACE conn5 -> [0,188,"executeScript",{"scriptTimeout":null,"newSandbox":true,"args":[],"filename":"executormarionette.py","script":"if (window.wrappedJSObject.win) {window.wrappedJSObject.win.close()}","sandbox":"default","line":430}]
23:36:48 INFO - TEST-START | /XMLHttpRequest/formdata.htm
23:36:48 INFO - PROCESS | 3252 | 1477636608194 Marionette TRACE conn5 <- [1,188,null,{"value":null}]
23:36:48 INFO - PROCESS | 3252 | 1477636608201 Marionette TRACE conn5 -> [0,189,"getWindowHandles",null]
23:36:48 INFO - PROCESS | 3252 | 1477636608204 Marionette TRACE conn5 <- [1,189,null,["13"]]
23:36:48 INFO - PROCESS | 3252 | 1477636608207 Marionette TRACE conn5 -> [0,190,"switchToWindow",{"name":"13"}]
23:36:48 INFO - PROCESS | 3252 | 1477636608211 Marionette TRACE conn5 <- [1,190,null,{}]
23:36:48 INFO - PROCESS | 3252 | 1477636608215 Marionette TRACE conn5 -> [0,191,"executeAsyncScript",{"scriptTimeout":null,"sandbox":"default","debug_script":false,"script":"/* This Source Code Form is subject to the terms of the Mozilla Public\n * License, v. 2.0. If a copy of the MPL was not distributed with this\n * file, You can obtain one at http://mozilla.org/MPL/2.0/. */\n\nwindow.wrappedJSObject.timeout_multiplier = 3;\nwindow.wrappedJSObject.explicit_timeout = 0;\n\nwindow.wrappedJSObject.addEventListener(\"message\", function listener(event) {\n if (event.data.type != \"complete\") {\n return;\n }\n window.wrappedJSObject.removeEventListener(\"message\", listener);\n clearTimeout(timer);\n var tests = event.data.tests;\n var status = event.data.status;\n\n var subtest_results = tests.map(function(x) {\n return [x.name, x.status, x.message, x.stack]\n });\n\n marionetteScriptFinished([\"/XMLHttpRequest/formdata.htm\",\n status.status,\n status.message,\n status.stack,\n subtest_results]);\n}, false);\n\nwindow.wrappedJSObject.win = window.open(\"http://web-platform.test:8000/XMLHttpRequest/formdata.htm\", \"9298bc64-aba3-4cf2-8943-12823d317f6b\");\n\nvar timer = null;\nif (30000) {\n timer = setTimeout(function() {\n log(\"Timeout fired\");\n window.wrappedJSObject.win.timeout();\n }, 30000);\n}\n","newSandbox":false,"line":445,"args":[],"filename":"executormarionette.py"}]
23:36:48 INFO - PROCESS | 3252 | ++DOCSHELL 000000E258588800 == 39 [pid = 3252] [id = 47]
23:36:48 INFO - PROCESS | 3252 | ++DOMWINDOW == 50 (000000E259A30800) [pid = 3252] [serial = 138] [outer = 0000000000000000]
23:36:48 INFO - PROCESS | 3252 | ++DOMWINDOW == 51 (000000E259E28800) [pid = 3252] [serial = 139] [outer = 000000E259A30800]
23:36:48 INFO - PROCESS | 3252 | 1477636608271 Marionette DEBUG loaded listener.js
23:36:48 INFO - PROCESS | 3252 | ++DOMWINDOW == 52 (000000E25A9CF000) [pid = 3252] [serial = 140] [outer = 000000E259A30800]
23:36:48 INFO - PROCESS | 3252 | 1477636608647 Marionette TRACE conn5 <- [1,191,null,{"value":["/XMLHttpRequest/formdata.htm",0,null,null,[["empty formdata",0,null,null],["formdata with string",0,null,null],["formdata with named string",0,null,null],["formdata from form",0,null,null]]]}]
23:36:48 INFO - ....
23:36:48 INFO - TEST-OK | /XMLHttpRequest/formdata.htm | took 587ms
23:36:48 INFO - PROCESS | 3252 | 1477636608688 Marionette TRACE conn5 -> [0,192,"getWindowHandle",null]
23:36:48 INFO - PROCESS | 3252 | 1477636608693 Marionette TRACE conn5 <- [1,192,null,{"value":"13"}]
23:36:48 INFO - TEST-START | /XMLHttpRequest/getallresponseheaders-cookies.htm
23:36:48 INFO - PROCESS | 3252 | 1477636608698 Marionette TRACE conn5 -> [0,193,"executeScript",{"scriptTimeout":null,"newSandbox":true,"args":[],"filename":"executormarionette.py","script":"if (window.wrappedJSObject.win) {window.wrappedJSObject.win.close()}","sandbox":"default","line":430}]
23:36:48 INFO - PROCESS | 3252 | 1477636608795 Marionette TRACE conn5 <- [1,193,null,{"value":null}]
23:36:48 INFO - PROCESS | 3252 | 1477636608803 Marionette TRACE conn5 -> [0,194,"getWindowHandles",null]
23:36:48 INFO - PROCESS | 3252 | 1477636608806 Marionette TRACE conn5 <- [1,194,null,["13"]]
23:36:48 INFO - PROCESS | 3252 | 1477636608809 Marionette TRACE conn5 -> [0,195,"switchToWindow",{"name":"13"}]
23:36:48 INFO - PROCESS | 3252 | 1477636608814 Marionette TRACE conn5 <- [1,195,null,{}]
23:36:48 INFO - PROCESS | 3252 | 1477636608817 Marionette TRACE conn5 -> [0,196,"executeAsyncScript",{"scriptTimeout":null,"sandbox":"default","debug_script":false,"script":"/* This Source Code Form is subject to the terms of the Mozilla Public\n * License, v. 2.0. If a copy of the MPL was not distributed with this\n * file, You can obtain one at http://mozilla.org/MPL/2.0/. */\n\nwindow.wrappedJSObject.timeout_multiplier = 3;\nwindow.wrappedJSObject.explicit_timeout = 0;\n\nwindow.wrappedJSObject.addEventListener(\"message\", function listener(event) {\n if (event.data.type != \"complete\") {\n return;\n }\n window.wrappedJSObject.removeEventListener(\"message\", listener);\n clearTimeout(timer);\n var tests = event.data.tests;\n var status = event.data.status;\n\n var subtest_results = tests.map(function(x) {\n return [x.name, x.status, x.message, x.stack]\n });\n\n marionetteScriptFinished([\"/XMLHttpRequest/getallresponseheaders-cookies.htm\",\n status.status,\n status.message,\n status.stack,\n subtest_results]);\n}, false);\n\nwindow.wrappedJSObject.win = window.open(\"http://web-platform.test:8000/XMLHttpRequest/getallresponseheaders-cookies.htm\", \"9298bc64-aba3-4cf2-8943-12823d317f6b\");\n\nvar timer = null;\nif (30000) {\n timer = setTimeout(function() {\n log(\"Timeout fired\");\n window.wrappedJSObject.win.timeout();\n }, 30000);\n}\n","newSandbox":false,"line":445,"args":[],"filename":"executormarionette.py"}]
23:36:48 INFO - PROCESS | 3252 | ++DOCSHELL 000000E25B628800 == 40 [pid = 3252] [id = 48]
23:36:48 INFO - PROCESS | 3252 | ++DOMWINDOW == 53 (000000E25B62E000) [pid = 3252] [serial = 141] [outer = 0000000000000000]
23:36:48 INFO - PROCESS | 3252 | ++DOMWINDOW == 54 (000000E25BB8F800) [pid = 3252] [serial = 142] [outer = 000000E25B62E000]
23:36:48 INFO - PROCESS | 3252 | 1477636608874 Marionette DEBUG loaded listener.js
23:36:48 INFO - PROCESS | 3252 | ++DOMWINDOW == 55 (000000E25C009000) [pid = 3252] [serial = 143] [outer = 000000E25B62E000]
23:36:49 INFO - PROCESS | 3252 | [3252] WARNING: blocked access to response header: file c:/builds/moz2_slave/fx-team-w64-d-0000000000000000/build/src/dom/xhr/XMLHttpRequestMainThread.cpp, line 1088
23:36:49 INFO - PROCESS | 3252 | [3252] WARNING: blocked access to response header: file c:/builds/moz2_slave/fx-team-w64-d-0000000000000000/build/src/dom/xhr/XMLHttpRequestMainThread.cpp, line 1088
23:36:49 INFO - PROCESS | 3252 | [3252] WARNING: blocked access to response header: file c:/builds/moz2_slave/fx-team-w64-d-0000000000000000/build/src/dom/xhr/XMLHttpRequestMainThread.cpp, line 1088
23:36:49 INFO - PROCESS | 3252 | [3252] WARNING: blocked access to response header: file c:/builds/moz2_slave/fx-team-w64-d-0000000000000000/build/src/dom/xhr/XMLHttpRequestMainThread.cpp, line 1088
23:36:49 INFO - PROCESS | 3252 | [3252] WARNING: blocked access to response header: file c:/builds/moz2_slave/fx-team-w64-d-0000000000000000/build/src/dom/xhr/XMLHttpRequestMainThread.cpp, line 1088
23:36:49 INFO - PROCESS | 3252 | [3252] WARNING: blocked access to response header: file c:/builds/moz2_slave/fx-team-w64-d-0000000000000000/build/src/dom/xhr/XMLHttpRequestMainThread.cpp, line 1088
23:36:49 INFO - PROCESS | 3252 | 1477636609222 Marionette TRACE conn5 <- [1,196,null,{"value":["/XMLHttpRequest/getallresponseheaders-cookies.htm",0,null,null,[["XMLHttpRequest: getAllResponseHeaders() excludes cookies",0,null,null]]]}]
23:36:49 INFO - .
23:36:49 INFO - TEST-OK | /XMLHttpRequest/getallresponseheaders-cookies.htm | took 566ms
23:36:49 INFO - PROCESS | 3252 | 1477636609267 Marionette TRACE conn5 -> [0,197,"getWindowHandle",null]
23:36:49 INFO - PROCESS | 3252 | 1477636609270 Marionette TRACE conn5 <- [1,197,null,{"value":"13"}]
23:36:49 INFO - TEST-START | /XMLHttpRequest/getallresponseheaders-status.htm
23:36:49 INFO - PROCESS | 3252 | 1477636609275 Marionette TRACE conn5 -> [0,198,"executeScript",{"scriptTimeout":null,"newSandbox":true,"args":[],"filename":"executormarionette.py","script":"if (window.wrappedJSObject.win) {window.wrappedJSObject.win.close()}","sandbox":"default","line":430}]
23:36:49 INFO - PROCESS | 3252 | 1477636609383 Marionette TRACE conn5 <- [1,198,null,{"value":null}]
23:36:49 INFO - PROCESS | 3252 | 1477636609411 Marionette TRACE conn5 -> [0,199,"getWindowHandles",null]
23:36:49 INFO - PROCESS | 3252 | 1477636609414 Marionette TRACE conn5 <- [1,199,null,["13"]]
23:36:49 INFO - PROCESS | 3252 | 1477636609420 Marionette TRACE conn5 -> [0,200,"switchToWindow",{"name":"13"}]
23:36:49 INFO - PROCESS | 3252 | 1477636609424 Marionette TRACE conn5 <- [1,200,null,{}]
23:36:49 INFO - PROCESS | 3252 | 1477636609427 Marionette TRACE conn5 -> [0,201,"executeAsyncScript",{"scriptTimeout":null,"sandbox":"default","debug_script":false,"script":"/* This Source Code Form is subject to the terms of the Mozilla Public\n * License, v. 2.0. If a copy of the MPL was not distributed with this\n * file, You can obtain one at http://mozilla.org/MPL/2.0/. */\n\nwindow.wrappedJSObject.timeout_multiplier = 3;\nwindow.wrappedJSObject.explicit_timeout = 0;\n\nwindow.wrappedJSObject.addEventListener(\"message\", function listener(event) {\n if (event.data.type != \"complete\") {\n return;\n }\n window.wrappedJSObject.removeEventListener(\"message\", listener);\n clearTimeout(timer);\n var tests = event.data.tests;\n var status = event.data.status;\n\n var subtest_results = tests.map(function(x) {\n return [x.name, x.status, x.message, x.stack]\n });\n\n marionetteScriptFinished([\"/XMLHttpRequest/getallresponseheaders-status.htm\",\n status.status,\n status.message,\n status.stack,\n subtest_results]);\n}, false);\n\nwindow.wrappedJSObject.win = window.open(\"http://web-platform.test:8000/XMLHttpRequest/getallresponseheaders-status.htm\", \"9298bc64-aba3-4cf2-8943-12823d317f6b\");\n\nvar timer = null;\nif (30000) {\n timer = setTimeout(function() {\n log(\"Timeout fired\");\n window.wrappedJSObject.win.timeout();\n }, 30000);\n}\n","newSandbox":false,"line":445,"args":[],"filename":"executormarionette.py"}]
23:36:49 INFO - PROCESS | 3252 | ++DOCSHELL 000000E25F586000 == 41 [pid = 3252] [id = 49]
23:36:49 INFO - PROCESS | 3252 | ++DOMWINDOW == 56 (000000E25F586800) [pid = 3252] [serial = 144] [outer = 0000000000000000]
23:36:49 INFO - PROCESS | 3252 | ++DOMWINDOW == 57 (000000E25F597800) [pid = 3252] [serial = 145] [outer = 000000E25F586800]
23:36:49 INFO - .
23:36:49 INFO - PROCESS | 3252 | 1477636609534 Marionette DEBUG loaded listener.js
23:36:49 INFO - TEST-OK | /XMLHttpRequest/getallresponseheaders-status.htm | took 594ms
23:36:49 INFO - PROCESS | 3252 | ++DOMWINDOW == 58 (000000E2604C2000) [pid = 3252] [serial = 146] [outer = 000000E25F586800]
23:36:49 INFO - PROCESS | 3252 | [3252] WARNING: blocked access to response header: file c:/builds/moz2_slave/fx-team-w64-d-0000000000000000/build/src/dom/xhr/XMLHttpRequestMainThread.cpp, line 1088
23:36:49 INFO - PROCESS | 3252 | [3252] WARNING: blocked access to response header: file c:/builds/moz2_slave/fx-team-w64-d-0000000000000000/build/src/dom/xhr/XMLHttpRequestMainThread.cpp, line 1088
23:36:49 INFO - PROCESS | 3252 | [3252] WARNING: blocked access to response header: file c:/builds/moz2_slave/fx-team-w64-d-0000000000000000/build/src/dom/xhr/XMLHttpRequestMainThread.cpp, line 1088
23:36:49 INFO - PROCESS | 3252 | [3252] WARNING: blocked access to response header: file c:/builds/moz2_slave/fx-team-w64-d-0000000000000000/build/src/dom/xhr/XMLHttpRequestMainThread.cpp, line 1088
23:36:49 INFO - PROCESS | 3252 | [3252] WARNING: blocked access to response header: file c:/builds/moz2_slave/fx-team-w64-d-0000000000000000/build/src/dom/xhr/XMLHttpRequestMainThread.cpp, line 1088
23:36:49 INFO - PROCESS | 3252 | [3252] WARNING: blocked access to response header: file c:/builds/moz2_slave/fx-team-w64-d-0000000000000000/build/src/dom/xhr/XMLHttpRequestMainThread.cpp, line 1088
23:36:49 INFO - TEST-START | /XMLHttpRequest/getresponseheader-case-insensitive.htm
23:36:49 INFO - PROCESS | 3252 | 1477636609819 Marionette TRACE conn5 <- [1,201,null,{"value":["/XMLHttpRequest/getallresponseheaders-status.htm",0,null,null,[["XMLHttpRequest: getAllResponseHeaders() excludes status",0,null,null]]]}]
23:36:49 INFO - PROCESS | 3252 | 1477636609870 Marionette TRACE conn5 -> [0,202,"getWindowHandle",null]
23:36:49 INFO - PROCESS | 3252 | 1477636609873 Marionette TRACE conn5 <- [1,202,null,{"value":"13"}]
23:36:49 INFO - PROCESS | 3252 | 1477636609877 Marionette TRACE conn5 -> [0,203,"executeScript",{"scriptTimeout":null,"newSandbox":true,"args":[],"filename":"executormarionette.py","script":"if (window.wrappedJSObject.win) {window.wrappedJSObject.win.close()}","sandbox":"default","line":430}]
23:36:49 INFO - PROCESS | 3252 | 1477636609969 Marionette TRACE conn5 <- [1,203,null,{"value":null}]
23:36:49 INFO - PROCESS | 3252 | 1477636609974 Marionette TRACE conn5 -> [0,204,"getWindowHandles",null]
23:36:49 INFO - PROCESS | 3252 | 1477636609976 Marionette TRACE conn5 <- [1,204,null,["13"]]
23:36:49 INFO - PROCESS | 3252 | 1477636609979 Marionette TRACE conn5 -> [0,205,"switchToWindow",{"name":"13"}]
23:36:49 INFO - PROCESS | 3252 | 1477636609982 Marionette TRACE conn5 <- [1,205,null,{}]
23:36:49 INFO - PROCESS | 3252 | 1477636609987 Marionette TRACE conn5 -> [0,206,"executeAsyncScript",{"scriptTimeout":null,"sandbox":"default","debug_script":false,"script":"/* This Source Code Form is subject to the terms of the Mozilla Public\n * License, v. 2.0. If a copy of the MPL was not distributed with this\n * file, You can obtain one at http://mozilla.org/MPL/2.0/. */\n\nwindow.wrappedJSObject.timeout_multiplier = 3;\nwindow.wrappedJSObject.explicit_timeout = 0;\n\nwindow.wrappedJSObject.addEventListener(\"message\", function listener(event) {\n if (event.data.type != \"complete\") {\n return;\n }\n window.wrappedJSObject.removeEventListener(\"message\", listener);\n clearTimeout(timer);\n var tests = event.data.tests;\n var status = event.data.status;\n\n var subtest_results = tests.map(function(x) {\n return [x.name, x.status, x.message, x.stack]\n });\n\n marionetteScriptFinished([\"/XMLHttpRequest/getresponseheader-case-insensitive.htm\",\n status.status,\n status.message,\n status.stack,\n subtest_results]);\n}, false);\n\nwindow.wrappedJSObject.win = window.open(\"http://web-platform.test:8000/XMLHttpRequest/getresponseheader-case-insensitive.htm\", \"9298bc64-aba3-4cf2-8943-12823d317f6b\");\n\nvar timer = null;\nif (30000) {\n timer = setTimeout(function() {\n log(\"Timeout fired\");\n window.wrappedJSObject.win.timeout();\n }, 30000);\n}\n","newSandbox":false,"line":445,"args":[],"filename":"executormarionette.py"}]
23:36:50 INFO - PROCESS | 3252 | ++DOCSHELL 000000E260E93800 == 42 [pid = 3252] [id = 50]
23:36:50 INFO - PROCESS | 3252 | ++DOMWINDOW == 59 (000000E260E95000) [pid = 3252] [serial = 147] [outer = 0000000000000000]
23:36:50 INFO - PROCESS | 3252 | ++DOMWINDOW == 60 (000000E260E9A800) [pid = 3252] [serial = 148] [outer = 000000E260E95000]
23:36:50 INFO - PROCESS | 3252 | 1477636610039 Marionette DEBUG loaded listener.js
23:36:50 INFO - PROCESS | 3252 | ++DOMWINDOW == 61 (000000E260F16000) [pid = 3252] [serial = 149] [outer = 000000E260E95000]
23:36:50 INFO - PROCESS | 3252 | 1477636610423 Marionette TRACE conn5 <- [1,206,null,{"value":["/XMLHttpRequest/getresponseheader-case-insensitive.htm",0,null,null,[["XMLHttpRequest: getResponseHeader() case-insensitive matching",0,null,null]]]}]
23:36:50 INFO - .
23:36:50 INFO - TEST-OK | /XMLHttpRequest/getresponseheader-case-insensitive.htm | took 569ms
23:36:50 INFO - PROCESS | 3252 | 1477636610446 Marionette TRACE conn5 -> [0,207,"getWindowHandle",null]
23:36:50 INFO - PROCESS | 3252 | 1477636610448 Marionette TRACE conn5 <- [1,207,null,{"value":"13"}]
23:36:50 INFO - TEST-START | /XMLHttpRequest/getresponseheader-chunked-trailer.htm
23:36:50 INFO - PROCESS | 3252 | 1477636610460 Marionette TRACE conn5 -> [0,208,"executeScript",{"scriptTimeout":null,"newSandbox":true,"args":[],"filename":"executormarionette.py","script":"if (window.wrappedJSObject.win) {window.wrappedJSObject.win.close()}","sandbox":"default","line":430}]
23:36:50 INFO - PROCESS | 3252 | 1477636610599 Marionette TRACE conn5 <- [1,208,null,{"value":null}]
23:36:50 INFO - PROCESS | 3252 | 1477636610604 Marionette TRACE conn5 -> [0,209,"getWindowHandles",null]
23:36:50 INFO - PROCESS | 3252 | 1477636610606 Marionette TRACE conn5 <- [1,209,null,["13"]]
23:36:50 INFO - PROCESS | 3252 | 1477636610609 Marionette TRACE conn5 -> [0,210,"switchToWindow",{"name":"13"}]
23:36:50 INFO - PROCESS | 3252 | 1477636610613 Marionette TRACE conn5 <- [1,210,null,{}]
23:36:50 INFO - PROCESS | 3252 | 1477636610650 Marionette TRACE conn5 -> [0,211,"executeAsyncScript",{"scriptTimeout":null,"sandbox":"default","debug_script":false,"script":"/* This Source Code Form is subject to the terms of the Mozilla Public\n * License, v. 2.0. If a copy of the MPL was not distributed with this\n * file, You can obtain one at http://mozilla.org/MPL/2.0/. */\n\nwindow.wrappedJSObject.timeout_multiplier = 3;\nwindow.wrappedJSObject.explicit_timeout = 0;\n\nwindow.wrappedJSObject.addEventListener(\"message\", function listener(event) {\n if (event.data.type != \"complete\") {\n return;\n }\n window.wrappedJSObject.removeEventListener(\"message\", listener);\n clearTimeout(timer);\n var tests = event.data.tests;\n var status = event.data.status;\n\n var subtest_results = tests.map(function(x) {\n return [x.name, x.status, x.message, x.stack]\n });\n\n marionetteScriptFinished([\"/XMLHttpRequest/getresponseheader-chunked-trailer.htm\",\n status.status,\n status.message,\n status.stack,\n subtest_results]);\n}, false);\n\nwindow.wrappedJSObject.win = window.open(\"http://web-platform.test:8000/XMLHttpRequest/getresponseheader-chunked-trailer.htm\", \"9298bc64-aba3-4cf2-8943-12823d317f6b\");\n\nvar timer = null;\nif (30000) {\n timer = setTimeout(function() {\n log(\"Timeout fired\");\n window.wrappedJSObject.win.timeout();\n }, 30000);\n}\n","newSandbox":false,"line":445,"args":[],"filename":"executormarionette.py"}]
23:36:50 INFO - PROCESS | 3252 | ++DOCSHELL 000000E254514800 == 43 [pid = 3252] [id = 51]
23:36:50 INFO - PROCESS | 3252 | ++DOMWINDOW == 62 (000000E2610B4000) [pid = 3252] [serial = 150] [outer = 0000000000000000]
23:36:50 INFO - PROCESS | 3252 | ++DOMWINDOW == 63 (000000E2610BA000) [pid = 3252] [serial = 151] [outer = 000000E2610B4000]
23:36:50 INFO - PROCESS | 3252 | 1477636610706 Marionette DEBUG loaded listener.js
23:36:50 INFO - PROCESS | 3252 | ++DOMWINDOW == 64 (000000E2610C7000) [pid = 3252] [serial = 152] [outer = 000000E2610B4000]
23:36:50 INFO - PROCESS | 3252 | --DOMWINDOW == 63 (000000E256F06000) [pid = 3252] [serial = 111] [outer = 0000000000000000] [url = http://web-platform.test:8000/XMLHttpRequest/event-timeout.htm]
23:36:50 INFO - PROCESS | 3252 | --DOMWINDOW == 62 (000000E253047000) [pid = 3252] [serial = 108] [outer = 0000000000000000] [url = http://web-platform.test:8000/XMLHttpRequest/event-timeout-order.htm]
23:36:50 INFO - PROCESS | 3252 | --DOMWINDOW == 61 (000000E25A131800) [pid = 3252] [serial = 114] [outer = 0000000000000000] [url = http://web-platform.test:8000/XMLHttpRequest/event-upload-progress-crossorigin.sub.htm]
23:36:50 INFO - PROCESS | 3252 | --DOMWINDOW == 60 (000000E260D94000) [pid = 3252] [serial = 105] [outer = 0000000000000000] [url = http://web-platform.test:8000/XMLHttpRequest/event-readystatechange-loaded.htm]
23:36:51 INFO - PROCESS | 3252 | 1477636611040 Marionette TRACE conn5 <- [1,211,null,{"value":["/XMLHttpRequest/getresponseheader-chunked-trailer.htm",0,null,null,[["XMLHttpRequest: getResponseHeader() and HTTP trailer",0,null,null]]]}]
23:36:51 INFO - .
23:36:51 INFO - TEST-OK | /XMLHttpRequest/getresponseheader-chunked-trailer.htm | took 628ms
23:36:51 INFO - PROCESS | 3252 | 1477636611084 Marionette TRACE conn5 -> [0,212,"getWindowHandle",null]
23:36:51 INFO - PROCESS | 3252 | 1477636611087 Marionette TRACE conn5 <- [1,212,null,{"value":"13"}]
23:36:51 INFO - TEST-START | /XMLHttpRequest/getresponseheader-cookies-and-more.htm
23:36:51 INFO - PROCESS | 3252 | 1477636611091 Marionette TRACE conn5 -> [0,213,"executeScript",{"scriptTimeout":null,"newSandbox":true,"args":[],"filename":"executormarionette.py","script":"if (window.wrappedJSObject.win) {window.wrappedJSObject.win.close()}","sandbox":"default","line":430}]
23:36:51 INFO - PROCESS | 3252 | 1477636611178 Marionette TRACE conn5 <- [1,213,null,{"value":null}]
23:36:51 INFO - PROCESS | 3252 | 1477636611183 Marionette TRACE conn5 -> [0,214,"getWindowHandles",null]
23:36:51 INFO - PROCESS | 3252 | 1477636611186 Marionette TRACE conn5 <- [1,214,null,["13"]]
23:36:51 INFO - PROCESS | 3252 | 1477636611190 Marionette TRACE conn5 -> [0,215,"switchToWindow",{"name":"13"}]
23:36:51 INFO - PROCESS | 3252 | 1477636611193 Marionette TRACE conn5 <- [1,215,null,{}]
23:36:51 INFO - PROCESS | 3252 | 1477636611197 Marionette TRACE conn5 -> [0,216,"executeAsyncScript",{"scriptTimeout":null,"sandbox":"default","debug_script":false,"script":"/* This Source Code Form is subject to the terms of the Mozilla Public\n * License, v. 2.0. If a copy of the MPL was not distributed with this\n * file, You can obtain one at http://mozilla.org/MPL/2.0/. */\n\nwindow.wrappedJSObject.timeout_multiplier = 3;\nwindow.wrappedJSObject.explicit_timeout = 0;\n\nwindow.wrappedJSObject.addEventListener(\"message\", function listener(event) {\n if (event.data.type != \"complete\") {\n return;\n }\n window.wrappedJSObject.removeEventListener(\"message\", listener);\n clearTimeout(timer);\n var tests = event.data.tests;\n var status = event.data.status;\n\n var subtest_results = tests.map(function(x) {\n return [x.name, x.status, x.message, x.stack]\n });\n\n marionetteScriptFinished([\"/XMLHttpRequest/getresponseheader-cookies-and-more.htm\",\n status.status,\n status.message,\n status.stack,\n subtest_results]);\n}, false);\n\nwindow.wrappedJSObject.win = window.open(\"http://web-platform.test:8000/XMLHttpRequest/getresponseheader-cookies-and-more.htm\", \"9298bc64-aba3-4cf2-8943-12823d317f6b\");\n\nvar timer = null;\nif (30000) {\n timer = setTimeout(function() {\n log(\"Timeout fired\");\n window.wrappedJSObject.win.timeout();\n }, 30000);\n}\n","newSandbox":false,"line":445,"args":[],"filename":"executormarionette.py"}]
23:36:51 INFO - PROCESS | 3252 | ++DOCSHELL 000000E261524800 == 44 [pid = 3252] [id = 52]
23:36:51 INFO - PROCESS | 3252 | ++DOMWINDOW == 61 (000000E261525000) [pid = 3252] [serial = 153] [outer = 0000000000000000]
23:36:51 INFO - PROCESS | 3252 | ++DOMWINDOW == 62 (000000E26152C800) [pid = 3252] [serial = 154] [outer = 000000E261525000]
23:36:51 INFO - PROCESS | 3252 | 1477636611248 Marionette DEBUG loaded listener.js
23:36:51 INFO - PROCESS | 3252 | ++DOMWINDOW == 63 (000000E261B17000) [pid = 3252] [serial = 155] [outer = 000000E261525000]
23:36:51 INFO - PROCESS | 3252 | [3252] WARNING: blocked access to response header: file c:/builds/moz2_slave/fx-team-w64-d-0000000000000000/build/src/dom/xhr/XMLHttpRequestMainThread.cpp, line 1088
23:36:51 INFO - PROCESS | 3252 | [3252] WARNING: blocked access to response header: file c:/builds/moz2_slave/fx-team-w64-d-0000000000000000/build/src/dom/xhr/XMLHttpRequestMainThread.cpp, line 1088
23:36:51 INFO - PROCESS | 3252 | [3252] WARNING: blocked access to response header: file c:/builds/moz2_slave/fx-team-w64-d-0000000000000000/build/src/dom/xhr/XMLHttpRequestMainThread.cpp, line 1088
23:36:51 INFO - PROCESS | 3252 | [3252] WARNING: blocked access to response header: file c:/builds/moz2_slave/fx-team-w64-d-0000000000000000/build/src/dom/xhr/XMLHttpRequestMainThread.cpp, line 1088
23:36:51 INFO - PROCESS | 3252 | [3252] WARNING: blocked access to response header: file c:/builds/moz2_slave/fx-team-w64-d-0000000000000000/build/src/dom/xhr/XMLHttpRequestMainThread.cpp, line 1088
23:36:51 INFO - PROCESS | 3252 | [3252] WARNING: blocked access to response header: file c:/builds/moz2_slave/fx-team-w64-d-0000000000000000/build/src/dom/xhr/XMLHttpRequestMainThread.cpp, line 1088
23:36:51 INFO - PROCESS | 3252 | 1477636611580 Marionette TRACE conn5 <- [1,216,null,{"value":["/XMLHttpRequest/getresponseheader-cookies-and-more.htm",0,null,null,[["XMLHttpRequest: getResponseHeader() custom/non-existent headers and cookies",0,null,null]]]}]
23:36:51 INFO - .
23:36:51 INFO - TEST-OK | /XMLHttpRequest/getresponseheader-cookies-and-more.htm | took 523ms
23:36:51 INFO - PROCESS | 3252 | 1477636611615 Marionette TRACE conn5 -> [0,217,"getWindowHandle",null]
23:36:51 INFO - PROCESS | 3252 | 1477636611617 Marionette TRACE conn5 <- [1,217,null,{"value":"13"}]
23:36:51 INFO - TEST-START | /XMLHttpRequest/getresponseheader-error-state.htm
23:36:51 INFO - PROCESS | 3252 | 1477636611621 Marionette TRACE conn5 -> [0,218,"executeScript",{"scriptTimeout":null,"newSandbox":true,"args":[],"filename":"executormarionette.py","script":"if (window.wrappedJSObject.win) {window.wrappedJSObject.win.close()}","sandbox":"default","line":430}]
23:36:51 INFO - PROCESS | 3252 | 1477636611707 Marionette TRACE conn5 <- [1,218,null,{"value":null}]
23:36:51 INFO - PROCESS | 3252 | 1477636611712 Marionette TRACE conn5 -> [0,219,"getWindowHandles",null]
23:36:51 INFO - PROCESS | 3252 | 1477636611714 Marionette TRACE conn5 <- [1,219,null,["13"]]
23:36:51 INFO - PROCESS | 3252 | 1477636611718 Marionette TRACE conn5 -> [0,220,"switchToWindow",{"name":"13"}]
23:36:51 INFO - PROCESS | 3252 | 1477636611722 Marionette TRACE conn5 <- [1,220,null,{}]
23:36:51 INFO - PROCESS | 3252 | 1477636611778 Marionette TRACE conn5 -> [0,221,"executeAsyncScript",{"scriptTimeout":null,"sandbox":"default","debug_script":false,"script":"/* This Source Code Form is subject to the terms of the Mozilla Public\n * License, v. 2.0. If a copy of the MPL was not distributed with this\n * file, You can obtain one at http://mozilla.org/MPL/2.0/. */\n\nwindow.wrappedJSObject.timeout_multiplier = 3;\nwindow.wrappedJSObject.explicit_timeout = 0;\n\nwindow.wrappedJSObject.addEventListener(\"message\", function listener(event) {\n if (event.data.type != \"complete\") {\n return;\n }\n window.wrappedJSObject.removeEventListener(\"message\", listener);\n clearTimeout(timer);\n var tests = event.data.tests;\n var status = event.data.status;\n\n var subtest_results = tests.map(function(x) {\n return [x.name, x.status, x.message, x.stack]\n });\n\n marionetteScriptFinished([\"/XMLHttpRequest/getresponseheader-error-state.htm\",\n status.status,\n status.message,\n status.stack,\n subtest_results]);\n}, false);\n\nwindow.wrappedJSObject.win = window.open(\"http://web-platform.test:8000/XMLHttpRequest/getresponseheader-error-state.htm\", \"9298bc64-aba3-4cf2-8943-12823d317f6b\");\n\nvar timer = null;\nif (30000) {\n timer = setTimeout(function() {\n log(\"Timeout fired\");\n window.wrappedJSObject.win.timeout();\n }, 30000);\n}\n","newSandbox":false,"line":445,"args":[],"filename":"executormarionette.py"}]
23:36:51 INFO - PROCESS | 3252 | ++DOCSHELL 000000E261B2B000 == 45 [pid = 3252] [id = 53]
23:36:51 INFO - PROCESS | 3252 | ++DOMWINDOW == 64 (000000E261B2B800) [pid = 3252] [serial = 156] [outer = 0000000000000000]
23:36:51 INFO - PROCESS | 3252 | ++DOMWINDOW == 65 (000000E261B2F800) [pid = 3252] [serial = 157] [outer = 000000E261B2B800]
23:36:51 INFO - PROCESS | 3252 | 1477636611830 Marionette DEBUG loaded listener.js
23:36:51 INFO - PROCESS | 3252 | ++DOMWINDOW == 66 (000000E261C78800) [pid = 3252] [serial = 158] [outer = 000000E261B2B800]
23:36:52 INFO - PROCESS | 3252 | 1477636612098 Marionette TRACE conn5 <- [1,221,null,{"value":["/XMLHttpRequest/getresponseheader-error-state.htm",0,null,null,[["XMLHttpRequest: getResponseHeader() in error state (failing cross-origin test)",0,null,null]]]}]
23:36:52 INFO - .
23:36:52 INFO - TEST-OK | /XMLHttpRequest/getresponseheader-error-state.htm | took 523ms
23:36:52 INFO - PROCESS | 3252 | 1477636612147 Marionette TRACE conn5 -> [0,222,"getWindowHandle",null]
23:36:52 INFO - PROCESS | 3252 | 1477636612150 Marionette TRACE conn5 <- [1,222,null,{"value":"13"}]
23:36:52 INFO - TEST-START | /XMLHttpRequest/getresponseheader-server-date.htm
23:36:52 INFO - PROCESS | 3252 | 1477636612154 Marionette TRACE conn5 -> [0,223,"executeScript",{"scriptTimeout":null,"newSandbox":true,"args":[],"filename":"executormarionette.py","script":"if (window.wrappedJSObject.win) {window.wrappedJSObject.win.close()}","sandbox":"default","line":430}]
23:36:52 INFO - PROCESS | 3252 | 1477636612242 Marionette TRACE conn5 <- [1,223,null,{"value":null}]
23:36:52 INFO - PROCESS | 3252 | 1477636612246 Marionette TRACE conn5 -> [0,224,"getWindowHandles",null]
23:36:52 INFO - PROCESS | 3252 | 1477636612249 Marionette TRACE conn5 <- [1,224,null,["13"]]
23:36:52 INFO - PROCESS | 3252 | 1477636612252 Marionette TRACE conn5 -> [0,225,"switchToWindow",{"name":"13"}]
23:36:52 INFO - PROCESS | 3252 | 1477636612256 Marionette TRACE conn5 <- [1,225,null,{}]
23:36:52 INFO - PROCESS | 3252 | 1477636612260 Marionette TRACE conn5 -> [0,226,"executeAsyncScript",{"scriptTimeout":null,"sandbox":"default","debug_script":false,"script":"/* This Source Code Form is subject to the terms of the Mozilla Public\n * License, v. 2.0. If a copy of the MPL was not distributed with this\n * file, You can obtain one at http://mozilla.org/MPL/2.0/. */\n\nwindow.wrappedJSObject.timeout_multiplier = 3;\nwindow.wrappedJSObject.explicit_timeout = 0;\n\nwindow.wrappedJSObject.addEventListener(\"message\", function listener(event) {\n if (event.data.type != \"complete\") {\n return;\n }\n window.wrappedJSObject.removeEventListener(\"message\", listener);\n clearTimeout(timer);\n var tests = event.data.tests;\n var status = event.data.status;\n\n var subtest_results = tests.map(function(x) {\n return [x.name, x.status, x.message, x.stack]\n });\n\n marionetteScriptFinished([\"/XMLHttpRequest/getresponseheader-server-date.htm\",\n status.status,\n status.message,\n status.stack,\n subtest_results]);\n}, false);\n\nwindow.wrappedJSObject.win = window.open(\"http://web-platform.test:8000/XMLHttpRequest/getresponseheader-server-date.htm\", \"9298bc64-aba3-4cf2-8943-12823d317f6b\");\n\nvar timer = null;\nif (30000) {\n timer = setTimeout(function() {\n log(\"Timeout fired\");\n window.wrappedJSObject.win.timeout();\n }, 30000);\n}\n","newSandbox":false,"line":445,"args":[],"filename":"executormarionette.py"}]
23:36:52 INFO - PROCESS | 3252 | ++DOCSHELL 000000E261C8D800 == 46 [pid = 3252] [id = 54]
23:36:52 INFO - PROCESS | 3252 | ++DOMWINDOW == 67 (000000E261C8E000) [pid = 3252] [serial = 159] [outer = 0000000000000000]
23:36:52 INFO - PROCESS | 3252 | ++DOMWINDOW == 68 (000000E25BA05800) [pid = 3252] [serial = 160] [outer = 000000E261C8E000]
23:36:52 INFO - PROCESS | 3252 | 1477636612312 Marionette DEBUG loaded listener.js
23:36:52 INFO - PROCESS | 3252 | ++DOMWINDOW == 69 (000000E25BA0F800) [pid = 3252] [serial = 161] [outer = 000000E261C8E000]
23:36:52 INFO - PROCESS | 3252 | 1477636612642 Marionette TRACE conn5 <- [1,226,null,{"value":["/XMLHttpRequest/getresponseheader-server-date.htm",0,null,null,[["XMLHttpRequest: getResponseHeader() server and date",0,null,null]]]}]
23:36:52 INFO - .
23:36:52 INFO - TEST-OK | /XMLHttpRequest/getresponseheader-server-date.htm | took 523ms
23:36:52 INFO - TEST-START | /XMLHttpRequest/getresponseheader-special-characters.htm
23:36:52 INFO - PROCESS | 3252 | 1477636612678 Marionette TRACE conn5 -> [0,227,"getWindowHandle",null]
23:36:52 INFO - PROCESS | 3252 | 1477636612680 Marionette TRACE conn5 <- [1,227,null,{"value":"13"}]
23:36:52 INFO - PROCESS | 3252 | 1477636612684 Marionette TRACE conn5 -> [0,228,"executeScript",{"scriptTimeout":null,"newSandbox":true,"args":[],"filename":"executormarionette.py","script":"if (window.wrappedJSObject.win) {window.wrappedJSObject.win.close()}","sandbox":"default","line":430}]
23:36:52 INFO - PROCESS | 3252 | 1477636612774 Marionette TRACE conn5 <- [1,228,null,{"value":null}]
23:36:52 INFO - PROCESS | 3252 | 1477636612779 Marionette TRACE conn5 -> [0,229,"getWindowHandles",null]
23:36:52 INFO - PROCESS | 3252 | 1477636612781 Marionette TRACE conn5 <- [1,229,null,["13"]]
23:36:52 INFO - PROCESS | 3252 | 1477636612785 Marionette TRACE conn5 -> [0,230,"switchToWindow",{"name":"13"}]
23:36:52 INFO - PROCESS | 3252 | 1477636612788 Marionette TRACE conn5 <- [1,230,null,{}]
23:36:52 INFO - PROCESS | 3252 | 1477636612793 Marionette TRACE conn5 -> [0,231,"executeAsyncScript",{"scriptTimeout":null,"sandbox":"default","debug_script":false,"script":"/* This Source Code Form is subject to the terms of the Mozilla Public\n * License, v. 2.0. If a copy of the MPL was not distributed with this\n * file, You can obtain one at http://mozilla.org/MPL/2.0/. */\n\nwindow.wrappedJSObject.timeout_multiplier = 3;\nwindow.wrappedJSObject.explicit_timeout = 0;\n\nwindow.wrappedJSObject.addEventListener(\"message\", function listener(event) {\n if (event.data.type != \"complete\") {\n return;\n }\n window.wrappedJSObject.removeEventListener(\"message\", listener);\n clearTimeout(timer);\n var tests = event.data.tests;\n var status = event.data.status;\n\n var subtest_results = tests.map(function(x) {\n return [x.name, x.status, x.message, x.stack]\n });\n\n marionetteScriptFinished([\"/XMLHttpRequest/getresponseheader-special-characters.htm\",\n status.status,\n status.message,\n status.stack,\n subtest_results]);\n}, false);\n\nwindow.wrappedJSObject.win = window.open(\"http://web-platform.test:8000/XMLHttpRequest/getresponseheader-special-characters.htm\", \"9298bc64-aba3-4cf2-8943-12823d317f6b\");\n\nvar timer = null;\nif (30000) {\n timer = setTimeout(function() {\n log(\"Timeout fired\");\n window.wrappedJSObject.win.timeout();\n }, 30000);\n}\n","newSandbox":false,"line":445,"args":[],"filename":"executormarionette.py"}]
23:36:52 INFO - PROCESS | 3252 | ++DOCSHELL 000000E260F1D800 == 47 [pid = 3252] [id = 55]
23:36:52 INFO - PROCESS | 3252 | ++DOMWINDOW == 70 (000000E260F20800) [pid = 3252] [serial = 162] [outer = 0000000000000000]
23:36:52 INFO - PROCESS | 3252 | ++DOMWINDOW == 71 (000000E257D14800) [pid = 3252] [serial = 163] [outer = 000000E260F20800]
23:36:52 INFO - PROCESS | 3252 | 1477636612846 Marionette DEBUG loaded listener.js
23:36:52 INFO - PROCESS | 3252 | ++DOMWINDOW == 72 (000000E257D1D000) [pid = 3252] [serial = 164] [outer = 000000E260F20800]
23:36:53 INFO - PROCESS | 3252 | 1477636613185 Marionette TRACE conn5 <- [1,231,null,{"value":["/XMLHttpRequest/getresponseheader-special-characters.htm",0,null,null,[["XMLHttpRequest: getResponseHeader() funny characters",0,null,null]]]}]
23:36:53 INFO - .
23:36:53 INFO - TEST-OK | /XMLHttpRequest/getresponseheader-special-characters.htm | took 524ms
23:36:53 INFO - PROCESS | 3252 | 1477636613211 Marionette TRACE conn5 -> [0,232,"getWindowHandle",null]
23:36:53 INFO - PROCESS | 3252 | 1477636613214 Marionette TRACE conn5 <- [1,232,null,{"value":"13"}]
23:36:53 INFO - TEST-START | /XMLHttpRequest/getresponseheader-unsent-opened-state.htm
23:36:53 INFO - PROCESS | 3252 | 1477636613218 Marionette TRACE conn5 -> [0,233,"executeScript",{"scriptTimeout":null,"newSandbox":true,"args":[],"filename":"executormarionette.py","script":"if (window.wrappedJSObject.win) {window.wrappedJSObject.win.close()}","sandbox":"default","line":430}]
23:36:53 INFO - PROCESS | 3252 | 1477636613350 Marionette TRACE conn5 <- [1,233,null,{"value":null}]
23:36:53 INFO - PROCESS | 3252 | 1477636613357 Marionette TRACE conn5 -> [0,234,"getWindowHandles",null]
23:36:53 INFO - PROCESS | 3252 | 1477636613359 Marionette TRACE conn5 <- [1,234,null,["13"]]
23:36:53 INFO - PROCESS | 3252 | 1477636613362 Marionette TRACE conn5 -> [0,235,"switchToWindow",{"name":"13"}]
23:36:53 INFO - PROCESS | 3252 | 1477636613367 Marionette TRACE conn5 <- [1,235,null,{}]
23:36:53 INFO - PROCESS | 3252 | 1477636613371 Marionette TRACE conn5 -> [0,236,"executeAsyncScript",{"scriptTimeout":null,"sandbox":"default","debug_script":false,"script":"/* This Source Code Form is subject to the terms of the Mozilla Public\n * License, v. 2.0. If a copy of the MPL was not distributed with this\n * file, You can obtain one at http://mozilla.org/MPL/2.0/. */\n\nwindow.wrappedJSObject.timeout_multiplier = 3;\nwindow.wrappedJSObject.explicit_timeout = 0;\n\nwindow.wrappedJSObject.addEventListener(\"message\", function listener(event) {\n if (event.data.type != \"complete\") {\n return;\n }\n window.wrappedJSObject.removeEventListener(\"message\", listener);\n clearTimeout(timer);\n var tests = event.data.tests;\n var status = event.data.status;\n\n var subtest_results = tests.map(function(x) {\n return [x.name, x.status, x.message, x.stack]\n });\n\n marionetteScriptFinished([\"/XMLHttpRequest/getresponseheader-unsent-opened-state.htm\",\n status.status,\n status.message,\n status.stack,\n subtest_results]);\n}, false);\n\nwindow.wrappedJSObject.win = window.open(\"http://web-platform.test:8000/XMLHttpRequest/getresponseheader-unsent-opened-state.htm\", \"9298bc64-aba3-4cf2-8943-12823d317f6b\");\n\nvar timer = null;\nif (30000) {\n timer = setTimeout(function() {\n log(\"Timeout fired\");\n window.wrappedJSObject.win.timeout();\n }, 30000);\n}\n","newSandbox":false,"line":445,"args":[],"filename":"executormarionette.py"}]
23:36:53 INFO - PROCESS | 3252 | ++DOCSHELL 000000E2610AE800 == 48 [pid = 3252] [id = 56]
23:36:53 INFO - PROCESS | 3252 | ++DOMWINDOW == 73 (000000E2610AF000) [pid = 3252] [serial = 165] [outer = 0000000000000000]
23:36:53 INFO - PROCESS | 3252 | ++DOMWINDOW == 74 (000000E2614BF800) [pid = 3252] [serial = 166] [outer = 000000E2610AF000]
23:36:53 INFO - PROCESS | 3252 | 1477636613428 Marionette DEBUG loaded listener.js
23:36:53 INFO - PROCESS | 3252 | ++DOMWINDOW == 75 (000000E2614CF800) [pid = 3252] [serial = 167] [outer = 000000E2610AF000]
23:36:53 INFO - PROCESS | 3252 | 1477636613747 Marionette TRACE conn5 <- [1,236,null,{"value":["/XMLHttpRequest/getresponseheader-unsent-opened-state.htm",0,null,null,[["XMLHttpRequest: getResponseHeader() in unsent, opened states",0,null,null]]]}]
23:36:53 INFO - .
23:36:53 INFO - TEST-OK | /XMLHttpRequest/getresponseheader-unsent-opened-state.htm | took 587ms
23:36:53 INFO - PROCESS | 3252 | 1477636613807 Marionette TRACE conn5 -> [0,237,"getWindowHandle",null]
23:36:53 INFO - PROCESS | 3252 | 1477636613810 Marionette TRACE conn5 <- [1,237,null,{"value":"13"}]
23:36:53 INFO - TEST-START | /XMLHttpRequest/headers-normalize-response.htm
23:36:53 INFO - PROCESS | 3252 | 1477636613814 Marionette TRACE conn5 -> [0,238,"executeScript",{"scriptTimeout":null,"newSandbox":true,"args":[],"filename":"executormarionette.py","script":"if (window.wrappedJSObject.win) {window.wrappedJSObject.win.close()}","sandbox":"default","line":430}]
23:36:53 INFO - PROCESS | 3252 | 1477636613901 Marionette TRACE conn5 <- [1,238,null,{"value":null}]
23:36:53 INFO - PROCESS | 3252 | 1477636613906 Marionette TRACE conn5 -> [0,239,"getWindowHandles",null]
23:36:53 INFO - PROCESS | 3252 | 1477636613908 Marionette TRACE conn5 <- [1,239,null,["13"]]
23:36:53 INFO - PROCESS | 3252 | 1477636613911 Marionette TRACE conn5 -> [0,240,"switchToWindow",{"name":"13"}]
23:36:53 INFO - PROCESS | 3252 | 1477636613915 Marionette TRACE conn5 <- [1,240,null,{}]
23:36:53 INFO - PROCESS | 3252 | 1477636613919 Marionette TRACE conn5 -> [0,241,"executeAsyncScript",{"scriptTimeout":null,"sandbox":"default","debug_script":false,"script":"/* This Source Code Form is subject to the terms of the Mozilla Public\n * License, v. 2.0. If a copy of the MPL was not distributed with this\n * file, You can obtain one at http://mozilla.org/MPL/2.0/. */\n\nwindow.wrappedJSObject.timeout_multiplier = 3;\nwindow.wrappedJSObject.explicit_timeout = 0;\n\nwindow.wrappedJSObject.addEventListener(\"message\", function listener(event) {\n if (event.data.type != \"complete\") {\n return;\n }\n window.wrappedJSObject.removeEventListener(\"message\", listener);\n clearTimeout(timer);\n var tests = event.data.tests;\n var status = event.data.status;\n\n var subtest_results = tests.map(function(x) {\n return [x.name, x.status, x.message, x.stack]\n });\n\n marionetteScriptFinished([\"/XMLHttpRequest/headers-normalize-response.htm\",\n status.status,\n status.message,\n status.stack,\n subtest_results]);\n}, false);\n\nwindow.wrappedJSObject.win = window.open(\"http://web-platform.test:8000/XMLHttpRequest/headers-normalize-response.htm\", \"9298bc64-aba3-4cf2-8943-12823d317f6b\");\n\nvar timer = null;\nif (30000) {\n timer = setTimeout(function() {\n log(\"Timeout fired\");\n window.wrappedJSObject.win.timeout();\n }, 30000);\n}\n","newSandbox":false,"line":445,"args":[],"filename":"executormarionette.py"}]
23:36:53 INFO - PROCESS | 3252 | ++DOCSHELL 000000E25B323800 == 49 [pid = 3252] [id = 57]
23:36:53 INFO - PROCESS | 3252 | ++DOMWINDOW == 76 (000000E25B324000) [pid = 3252] [serial = 168] [outer = 0000000000000000]
23:36:53 INFO - PROCESS | 3252 | ++DOMWINDOW == 77 (000000E25B328000) [pid = 3252] [serial = 169] [outer = 000000E25B324000]
23:36:53 INFO - PROCESS | 3252 | 1477636613970 Marionette DEBUG loaded listener.js
23:36:54 INFO - PROCESS | 3252 | ++DOMWINDOW == 78 (000000E25B330800) [pid = 3252] [serial = 170] [outer = 000000E25B324000]
23:36:54 INFO - PROCESS | 3252 | 1477636614546 Marionette TRACE conn5 <- [1,241,null,{"value":["/XMLHttpRequest/headers-normalize-response.htm",0,null,null,[["Header value: hello_world\\0",0,null,null],["Header value: \\0hello_world",0,null,null],["Header value: hello\\0world",0,null,null],["Header value: __hello_world",0,null,null],["Header value: hello_world__",0,null,null],["Header value: __hello_world__",0,null,null],["Header value: [tab]hello_world",0,null,null],["Header value: hello_world[tab]",0,null,null],["Header value: [tab]hello_world[tab]",0,null,null],["Header value: hello______world",0,null,null],["Header value: hello[tab]world",0,null,null],["Header value: \\0",0,null,null],["Header value: ___",0,null,null],["Header value: [tab]",0,null,null],["Header value: ",0,null,null]]]}]
23:36:54 INFO - ...............
23:36:54 INFO - TEST-OK | /XMLHttpRequest/headers-normalize-response.htm | took 777ms
23:36:54 INFO - PROCESS | 3252 | 1477636614595 Marionette TRACE conn5 -> [0,242,"getWindowHandle",null]
23:36:54 INFO - PROCESS | 3252 | 1477636614601 Marionette TRACE conn5 <- [1,242,null,{"value":"13"}]
23:36:54 INFO - TEST-START | /XMLHttpRequest/interfaces.html
23:36:54 INFO - PROCESS | 3252 | 1477636614608 Marionette TRACE conn5 -> [0,243,"executeScript",{"scriptTimeout":null,"newSandbox":true,"args":[],"filename":"executormarionette.py","script":"if (window.wrappedJSObject.win) {window.wrappedJSObject.win.close()}","sandbox":"default","line":430}]
23:36:54 INFO - PROCESS | 3252 | 1477636614748 Marionette TRACE conn5 <- [1,243,null,{"value":null}]
23:36:54 INFO - PROCESS | 3252 | 1477636614824 Marionette TRACE conn5 -> [0,244,"getWindowHandles",null]
23:36:54 INFO - PROCESS | 3252 | 1477636614829 Marionette TRACE conn5 <- [1,244,null,["13"]]
23:36:54 INFO - PROCESS | 3252 | 1477636614834 Marionette TRACE conn5 -> [0,245,"switchToWindow",{"name":"13"}]
23:36:54 INFO - PROCESS | 3252 | 1477636614839 Marionette TRACE conn5 <- [1,245,null,{}]
23:36:54 INFO - PROCESS | 3252 | 1477636614844 Marionette TRACE conn5 -> [0,246,"executeAsyncScript",{"scriptTimeout":null,"sandbox":"default","debug_script":false,"script":"/* This Source Code Form is subject to the terms of the Mozilla Public\n * License, v. 2.0. If a copy of the MPL was not distributed with this\n * file, You can obtain one at http://mozilla.org/MPL/2.0/. */\n\nwindow.wrappedJSObject.timeout_multiplier = 3;\nwindow.wrappedJSObject.explicit_timeout = 0;\n\nwindow.wrappedJSObject.addEventListener(\"message\", function listener(event) {\n if (event.data.type != \"complete\") {\n return;\n }\n window.wrappedJSObject.removeEventListener(\"message\", listener);\n clearTimeout(timer);\n var tests = event.data.tests;\n var status = event.data.status;\n\n var subtest_results = tests.map(function(x) {\n return [x.name, x.status, x.message, x.stack]\n });\n\n marionetteScriptFinished([\"/XMLHttpRequest/interfaces.html\",\n status.status,\n status.message,\n status.stack,\n subtest_results]);\n}, false);\n\nwindow.wrappedJSObject.win = window.open(\"http://web-platform.test:8000/XMLHttpRequest/interfaces.html\", \"9298bc64-aba3-4cf2-8943-12823d317f6b\");\n\nvar timer = null;\nif (30000) {\n timer = setTimeout(function() {\n log(\"Timeout fired\");\n window.wrappedJSObject.win.timeout();\n }, 30000);\n}\n","newSandbox":false,"line":445,"args":[],"filename":"executormarionette.py"}]
23:36:54 INFO - PROCESS | 3252 | ++DOCSHELL 000000E257D31000 == 50 [pid = 3252] [id = 58]
23:36:54 INFO - PROCESS | 3252 | ++DOMWINDOW == 79 (000000E257D31800) [pid = 3252] [serial = 171] [outer = 0000000000000000]
23:36:54 INFO - PROCESS | 3252 | ++DOMWINDOW == 80 (000000E25817E000) [pid = 3252] [serial = 172] [outer = 000000E257D31800]
23:36:54 INFO - PROCESS | 3252 | 1477636614915 Marionette DEBUG loaded listener.js
23:36:55 INFO - PROCESS | 3252 | ++DOMWINDOW == 81 (000000E25A9C9800) [pid = 3252] [serial = 173] [outer = 000000E257D31800]
23:36:55 INFO - PROCESS | 3252 | [3252] WARNING: NS_ENSURE_TRUE(ParseTypeAttribute(type, &version)) failed: file c:/builds/moz2_slave/fx-team-w64-d-0000000000000000/build/src/dom/base/nsScriptLoader.cpp, line 1447
23:36:55 INFO - PROCESS | 3252 | [3252] WARNING: NS_ENSURE_TRUE(ParseTypeAttribute(type, &version)) failed: file c:/builds/moz2_slave/fx-team-w64-d-0000000000000000/build/src/dom/base/nsScriptLoader.cpp, line 1447
23:36:55 INFO - PROCESS | 3252 | [3252] WARNING: NS_ENSURE_TRUE(ParseTypeAttribute(type, &version)) failed: file c:/builds/moz2_slave/fx-team-w64-d-0000000000000000/build/src/dom/base/nsScriptLoader.cpp, line 1447
23:36:56 INFO - PROCESS | 3252 | 1477636616107 Marionette TRACE conn5 <- [1,246,null,{"value":["/XMLHttpRequest/interfaces.html",0,null,null,[["XMLHttpRequestEventTarget interface: existence and properties of interface object",0,null,null],["XMLHttpRequestEventTarget interface object length",0,null,null],["XMLHttpRequestEventTarget interface object name",0,null,null],["XMLHttpRequestEventTarget interface: existence and properties of interface prototype object",0,null,null],["XMLHttpRequestEventTarget interface: existence and properties of interface prototype object's \"constructor\" property",0,null,null],["XMLHttpRequestEventTarget interface: attribute onloadstart",0,null,null],["XMLHttpRequestEventTarget interface: attribute onprogress",0,null,null],["XMLHttpRequestEventTarget interface: attribute onabort",0,null,null],["XMLHttpRequestEventTarget interface: attribute onerror",0,null,null],["XMLHttpRequestEventTarget interface: attribute onload",0,null,null],["XMLHttpRequestEventTarget interface: attribute ontimeout",0,null,null],["XMLHttpRequestEventTarget interface: attribute onloadend",0,null,null],["XMLHttpRequestUpload interface: existence and properties of interface object",0,null,null],["XMLHttpRequestUpload interface object length",0,null,null],["XMLHttpRequestUpload interface object name",0,null,null],["XMLHttpRequestUpload interface: existence and properties of interface prototype object",0,null,null],["XMLHttpRequestUpload interface: existence and properties of interface prototype object's \"constructor\" property",0,null,null],["XMLHttpRequestUpload must be primary interface of (new XMLHttpRequest()).upload",0,null,null],["Stringification of (new XMLHttpRequest()).upload",0,null,null],["XMLHttpRequestEventTarget interface: (new XMLHttpRequest()).upload must inherit property \"onloadstart\" with the proper type (0)",0,null,null],["XMLHttpRequestEventTarget interface: (new XMLHttpRequest()).upload must inherit property \"onprogress\" with the proper type (1)",0,null,null],["XMLHttpRequestEventTarget interface: (new XMLHttpRequest()).upload must inherit property \"onabort\" with the proper type (2)",0,null,null],["XMLHttpRequestEventTarget interface: (new XMLHttpRequest()).upload must inherit property \"onerror\" with the proper type (3)",0,null,null],["XMLHttpRequestEventTarget interface: (new XMLHttpRequest()).upload must inherit property \"onload\" with the proper type (4)",0,null,null],["XMLHttpRequestEventTarget interface: (new XMLHttpRequest()).upload must inherit property \"ontimeout\" with the proper type (5)",0,null,null],["XMLHttpRequestEventTarget interface: (new XMLHttpRequest()).upload must inherit property \"onloadend\" with the proper type (6)",0,null,null],["EventTarget interface: (new XMLHttpRequest()).upload must inherit property \"addEventListener\" with the proper type (0)",0,null,null],["EventTarget interface: calling addEventListener(DOMString,EventListener,boolean) on (new XMLHttpRequest()).upload with too few arguments must throw TypeError",0,null,null],["EventTarget interface: (new XMLHttpRequest()).upload must inherit property \"removeEventListener\" with the proper type (1)",0,null,null],["EventTarget interface: calling removeEventListener(DOMString,EventListener,boolean) on (new XMLHttpRequest()).upload with too few arguments must throw TypeError",0,null,null],["EventTarget interface: (new XMLHttpRequest()).upload must inherit property \"dispatchEvent\" with the proper type (2)",0,null,null],["EventTarget interface: calling dispatchEvent(Event) on (new XMLHttpRequest()).upload with too few arguments must throw TypeError",0,null,null],["XMLHttpRequest interface: existence and properties of interface object",0,null,null],["XMLHttpRequest interface object length",0,null,null],["XMLHttpRequest interface object name",0,null,null],["XMLHttpRequest interface: existence and properties of interface prototype object",0,null,null],["XMLHttpRequest interface: existence and properties of interface prototype object's \"constructor\" property",0,null,null],["XMLHttpRequest interface: attribute onreadystatechange",0,null,null],["XMLHttpRequest interface: constant UNSENT on interface object",0,null,null],["XMLHttpRequest interface: constant UNSENT on interface prototype object",0,null,null],["XMLHttpRequest interface: constant OPENED on interface object",0,null,null],["XMLHttpRequest interface: constant OPENED on interface prototype object",0,null,null],["XMLHttpRequest interface: constant HEADERS_RECEIVED on interface object",0,null,null],["XMLHttpRequest interface: constant HEADERS_RECEIVED on interface prototype object",0,null,null],["XMLHttpRequest interface: constant LOADING on interface object",0,null,null],["XMLHttpRequest interface: constant LOADING on interface prototype object",0,null,null],["XMLHttpRequest interface: constant DONE on interface object",0,null,null],["XMLHttpRequest interface: constant DONE on interface prototype object",0,null,null],["XMLHttpRequest interface: attribute readyState",0,null,null],["XMLHttpRequest interface: operation open(ByteString,USVString)",0,null,null],["XMLHttpRequest interface: operation open(ByteString,USVString,boolean,USVString,USVString)",0,null,null],["XMLHttpRequest interface: operation setRequestHeader(ByteString,ByteString)",0,null,null],["XMLHttpRequest interface: attribute timeout",0,null,null],["XMLHttpRequest interface: attribute withCredentials",0,null,null],["XMLHttpRequest interface: attribute upload",0,null,null],["XMLHttpRequest interface: operation send([object Object],[object Object])",0,null,null],["XMLHttpRequest interface: operation abort()",0,null,null],["XMLHttpRequest interface: attribute responseURL",0,null,null],["XMLHttpRequest interface: attribute status",0,null,null],["XMLHttpRequest interface: attribute statusText",0,null,null],["XMLHttpRequest interface: operation getResponseHeader(ByteString)",0,null,null],["XMLHttpRequest interface: operation getAllResponseHeaders()",0,null,null],["XMLHttpRequest interface: operation overrideMimeType(DOMString)",0,null,null],["XMLHttpRequest interface: attribute responseType",0,null,null],["XMLHttpRequest interface: attribute response",0,null,null],["XMLHttpRequest interface: attribute responseText",0,null,null],["XMLHttpRequest interface: attribute responseXML",0,null,null],["XMLHttpRequest must be primary interface of new XMLHttpRequest()",0,null,null],["Stringification of new XMLHttpRequest()",0,null,null],["XMLHttpRequest interface: new XMLHttpRequest() must inherit property \"onreadystatechange\" with the proper type (0)",0,null,null],["XMLHttpRequest interface: new XMLHttpRequest() must inherit property \"UNSENT\" with the proper type (1)",0,null,null],["XMLHttpRequest interface: new XMLHttpRequest() must inherit property \"OPENED\" with the proper type (2)",0,null,null],["XMLHttpRequest interface: new XMLHttpRequest() must inherit property \"HEADERS_RECEIVED\" with the proper type (3)",0,null,null],["XMLHttpRequest interface: new XMLHttpRequest() must inherit property \"LOADING\" with the proper type (4)",0,null,null],["XMLHttpRequest interface: new XMLHttpRequest() must inherit property \"DONE\" with the proper type (5)",0,null,null],["XMLHttpRequest interface: new XMLHttpRequest() must inherit property \"readyState\" with the proper type (6)",0,null,null],["XMLHttpRequest interface: new XMLHttpRequest() must inherit property \"open\" with the proper type (7)",0,null,null],["XMLHttpRequest interface: calling open(ByteString,USVString) on new XMLHttpRequest() with too few arguments must throw TypeError",0,null,null],["XMLHttpRequest interface: new XMLHttpRequest() must inherit property \"open\" with the proper type (8)",0,null,null],["XMLHttpRequest interface: calling open(ByteString,USVString,boolean,USVString,USVString) on new XMLHttpRequest() with too few arguments must throw TypeError",0,null,null],["XMLHttpRequest interface: new XMLHttpRequest() must inherit property \"setRequestHeader\" with the proper type (9)",0,null,null],["XMLHttpRequest interface: calling setRequestHeader(ByteString,ByteString) on new XMLHttpRequest() with too few arguments must throw TypeError",0,null,null],["XMLHttpRequest interface: new XMLHttpRequest() must inherit property \"timeout\" with the proper type (10)",0,null,null],["XMLHttpRequest interface: new XMLHttpRequest() must inherit property \"withCredentials\" with the proper type (11)",0,null,null],["XMLHttpRequest interface: new XMLHttpRequest() must inherit property \"upload\" with the proper type (12)",0,null,null],["XMLHttpRequest interface: new XMLHttpRequest() must inherit property \"send\" with the proper type (13)",0,null,null],["XMLHttpRequest interface: calling send([object Object],[object Object]) on new XMLHttpRequest() with too few arguments must throw TypeError",0,null,null],["XMLHttpRequest interface: new XMLHttpRequest() must inherit property \"abort\" with the proper type (14)",0,null,null],["XMLHttpRequest interface: new XMLHttpRequest() must inherit property \"responseURL\" with the proper type (15)",0,null,null],["XMLHttpRequest interface: new XMLHttpRequest() must inherit property \"status\" with the proper type (16)",0,null,null],["XMLHttpRequest interface: new XMLHttpRequest() must inherit property \"statusText\" with the proper type (17)",0,null,null],["XMLHttpRequest interface: new XMLHttpRequest() must inherit property \"getResponseHeader\" with the proper type (18)",0,null,null],["XMLHttpRequest interface: calling getResponseHeader(ByteString) on new XMLHttpRequest() with too few arguments must throw TypeError",0,null,null],["XMLHttpRequest interface: new XMLHttpRequest() must inherit property \"getAllResponseHeaders\" with the proper type (19)",0,null,null],["XMLHttpRequest interface: new XMLHttpRequest() must inherit property \"overrideMimeType\" with the proper type (20)",0,null,null],["XMLHttpRequest interface: calling overrideMimeType(DOMString) on new XMLHttpRequest() with too few arguments must throw TypeError",0,null,null],["XMLHttpRequest interface: new XMLHttpRequest() must inherit property \"responseType\" with the proper type (21)",0,null,null],["XMLHttpRequest interface: new XMLHttpRequest() must inherit property \"response\" with the proper type (22)",0,null,null],["XMLHttpRequest interface: new XMLHttpRequest() must inherit property \"responseText\" with the proper type (23)",0,null,null],["XMLHttpRequest interface: new XMLHttpRequest() must inherit property \"responseXML\" with the proper type (24)",0,null,null],["XMLHttpRequestEventTarget interface: new XMLHttpRequest() must inherit property \"onloadstart\" with the proper type (0)",0,null,null],["XMLHttpRequestEventTarget interface: new XMLHttpRequest() must inherit property \"onprogress\" with the proper type (1)",0,null,null],["XMLHttpRequestEventTarget interface: new XMLHttpRequest() must inherit property \"onabort\" with the proper type (2)",0,null,null],["XMLHttpRequestEventTarget interface: new XMLHttpRequest() must inherit property \"onerror\" with the proper type (3)",0,null,null],["XMLHttpRequestEventTarget interface: new XMLHttpRequest() must inherit property \"onload\" with the proper type (4)",0,null,null],["XMLHttpRequestEventTarget interface: new XMLHttpRequest() must inherit property \"ontimeout\" with the proper type (5)",0,null,null],["XMLHttpRequestEventTarget interface: new XMLHttpRequest() must inherit property \"onloadend\" with the proper type (6)",0,null,null],["EventTarget interface: new XMLHttpRequest() must inherit property \"addEventListener\" with the proper type (0)",0,null,null],["EventTarget interface: calling addEventListener(DOMString,EventListener,boolean) on new XMLHttpRequest() with too few arguments must throw TypeError",0,null,null],["EventTarget interface: new XMLHttpRequest() must inherit property \"removeEventListener\" with the proper type (1)",0,null,null],["EventTarget interface: calling removeEventListener(DOMString,EventListener,boolean) on new XMLHttpRequest() with too few arguments must throw TypeError",0,null,null],["EventTarget interface: new XMLHttpRequest() must inherit property \"dispatchEvent\" with the proper type (2)",0,null,null],["EventTarget interface: calling dispatchEvent(Event) on new XMLHttpRequest() with too few arguments must throw TypeError",0,null,null],["FormData interface: existence and properties of interface object",0,null,null],["FormData interface object length",0,null,null],["FormData interface object name",0,null,null],["FormData interface: existence and properties of interface prototype object",0,null,null],["FormData interface: existence and properties of interface prototype object's \"constructor\" property",0,null,null],["FormData interface: operation append(USVString,Blob,USVString)",0,null,null],["FormData interface: operation append(USVString,USVString)",0,null,null],["FormData interface: operation delete(USVString)",0,null,null],["FormData interface: operation get(USVString)",0,null,null],["FormData interface: operation getAll(USVString)",0,null,null],["FormData interface: operation has(USVString)",0,null,null],["FormData interface: operation set(USVString,Blob,USVString)",0,null,null],["FormData interface: operation set(USVString,USVString)",0,null,null],["FormData must be primary interface of new FormData()",0,null,null],["Stringification of new FormData()",0,null,null],["FormData interface: new FormData() must inherit property \"append\" with the proper type (0)",0,null,null],["FormData interface: calling append(USVString,Blob,USVString) on new FormData() with too few arguments must throw TypeError",0,null,null],["FormData interface: new FormData() must inherit property \"append\" with the proper type (1)",0,null,null],["FormData interface: calling append(USVString,USVString) on new FormData() with too few arguments must throw TypeError",0,null,null],["FormData interface: new FormData() must inherit property \"delete\" with the proper type (2)",0,null,null],["FormData interface: calling delete(USVString) on new FormData() with too few arguments must throw TypeError",0,null,null],["FormData interface: new FormData() must inherit property \"get\" with the proper type (3)",0,null,null],["FormData interface: calling get(USVString) on new FormData() with too few arguments must throw TypeError",0,null,null],["FormData interface: new FormData() must inherit property \"getAll\" with the proper type (4)",0,null,null],["FormData interface: calling getAll(USVString) on new FormData() with too few arguments must throw TypeError",0,null,null],["FormData interface: new FormData() must inherit property \"has\" with the proper type (5)",0,null,null],["FormData interface: calling has(USVString) on new FormData() with too few arguments must throw TypeError",0,null,null],["FormData interface: new FormData() must inherit property \"set\" with the proper type (6)",0,null,null],["FormData interface: calling set(USVString,Blob,USVString) on new FormData() with too few arguments must throw TypeError",0,null,null],["FormData interface: new FormData() must inherit property \"set\" with the proper type (7)",0,null,null],["FormData interface: calling set(USVString,USVString) on new FormData() with too few arguments must throw TypeError",0,null,null],["FormData must be primary interface of new FormData(form)",0,null,null],["Stringification of new FormData(form)",0,null,null],["FormData interface: new FormData(form) must inherit property \"append\" with the proper type (0)",0,null,null],["FormData interface: calling append(USVString,Blob,USVString) on new FormData(form) with too few arguments must throw TypeError",0,null,null],["FormData interface: new FormData(form) must inherit property \"append\" with the proper type (1)",0,null,null],["FormData interface: calling append(USVString,USVString) on new FormData(form) with too few arguments must throw TypeError",0,null,null],["FormData interface: new FormData(form) must inherit property \"delete\" with the proper type (2)",0,null,null],["FormData interface: calling delete(USVString) on new FormData(form) with too few arguments must throw TypeError",0,null,null],["FormData interface: new FormData(form) must inherit property \"get\" with the proper type (3)",0,null,null],["FormData interface: calling get(USVString) on new FormData(form) with too few arguments must throw TypeError",0,null,null],["FormData interface: new FormData(form) must inherit property \"getAll\" with the proper type (4)",0,null,null],["FormData interface: calling getAll(USVString) on new FormData(form) with too few arguments must throw TypeError",0,null,null],["FormData interface: new FormData(form) must inherit property \"has\" with the proper type (5)",0,null,null],["FormData interface: calling has(USVString) on new FormData(form) with too few arguments must throw TypeError",0,null,null],["FormData interface: new FormData(form) must inherit property \"set\" with the proper type (6)",0,null,null],["FormData interface: calling set(USVString,Blob,USVString) on new FormData(form) with too few arguments must throw TypeError",0,null,null],["FormData interface: new FormData(form) must inherit property \"set\" with the proper type (7)",0,null,null],["FormData interface: calling set(USVString,USVString) on new FormData(form) with too few arguments must throw TypeError",0,null,null],["ProgressEvent interface: existence and properties of interface object",0,null,null],["ProgressEvent interface object length",0,null,null],["ProgressEvent interface object name",0,null,null],["ProgressEvent interface: existence and properties of interface prototype object",0,null,null],["ProgressEvent interface: existence and properties of interface prototype object's \"constructor\" property",0,null,null],["ProgressEvent interface: attribute lengthComputable",0,null,null],["ProgressEvent interface: attribute loaded",0,null,null],["ProgressEvent interface: attribute total",0,null,null]]]}]
23:36:56 INFO - ..........................................................................................................................................................................
23:36:56 INFO - TEST-OK | /XMLHttpRequest/interfaces.html | took 1580ms
23:36:56 INFO - PROCESS | 3252 | 1477636616189 Marionette TRACE conn5 -> [0,247,"getWindowHandle",null]
23:36:56 INFO - PROCESS | 3252 | 1477636616193 Marionette TRACE conn5 <- [1,247,null,{"value":"13"}]
23:36:56 INFO - TEST-START | /XMLHttpRequest/open-after-abort.htm
23:36:56 INFO - PROCESS | 3252 | 1477636616198 Marionette TRACE conn5 -> [0,248,"executeScript",{"scriptTimeout":null,"newSandbox":true,"args":[],"filename":"executormarionette.py","script":"if (window.wrappedJSObject.win) {window.wrappedJSObject.win.close()}","sandbox":"default","line":430}]
23:36:56 INFO - PROCESS | 3252 | 1477636616369 Marionette TRACE conn5 <- [1,248,null,{"value":null}]
23:36:56 INFO - PROCESS | 3252 | 1477636616451 Marionette TRACE conn5 -> [0,249,"getWindowHandles",null]
23:36:56 INFO - PROCESS | 3252 | 1477636616455 Marionette TRACE conn5 <- [1,249,null,["13"]]
23:36:56 INFO - PROCESS | 3252 | 1477636616461 Marionette TRACE conn5 -> [0,250,"switchToWindow",{"name":"13"}]
23:36:56 INFO - PROCESS | 3252 | 1477636616465 Marionette TRACE conn5 <- [1,250,null,{}]
23:36:56 INFO - PROCESS | 3252 | 1477636616470 Marionette TRACE conn5 -> [0,251,"executeAsyncScript",{"scriptTimeout":null,"sandbox":"default","debug_script":false,"script":"/* This Source Code Form is subject to the terms of the Mozilla Public\n * License, v. 2.0. If a copy of the MPL was not distributed with this\n * file, You can obtain one at http://mozilla.org/MPL/2.0/. */\n\nwindow.wrappedJSObject.timeout_multiplier = 3;\nwindow.wrappedJSObject.explicit_timeout = 0;\n\nwindow.wrappedJSObject.addEventListener(\"message\", function listener(event) {\n if (event.data.type != \"complete\") {\n return;\n }\n window.wrappedJSObject.removeEventListener(\"message\", listener);\n clearTimeout(timer);\n var tests = event.data.tests;\n var status = event.data.status;\n\n var subtest_results = tests.map(function(x) {\n return [x.name, x.status, x.message, x.stack]\n });\n\n marionetteScriptFinished([\"/XMLHttpRequest/open-after-abort.htm\",\n status.status,\n status.message,\n status.stack,\n subtest_results]);\n}, false);\n\nwindow.wrappedJSObject.win = window.open(\"http://web-platform.test:8000/XMLHttpRequest/open-after-abort.htm\", \"9298bc64-aba3-4cf2-8943-12823d317f6b\");\n\nvar timer = null;\nif (30000) {\n timer = setTimeout(function() {\n log(\"Timeout fired\");\n window.wrappedJSObject.win.timeout();\n }, 30000);\n}\n","newSandbox":false,"line":445,"args":[],"filename":"executormarionette.py"}]
23:36:56 INFO - PROCESS | 3252 | ++DOCSHELL 000000E260F2A800 == 51 [pid = 3252] [id = 59]
23:36:56 INFO - PROCESS | 3252 | ++DOMWINDOW == 82 (000000E260F2B000) [pid = 3252] [serial = 174] [outer = 0000000000000000]
23:36:56 INFO - PROCESS | 3252 | ++DOMWINDOW == 83 (000000E2610AF800) [pid = 3252] [serial = 175] [outer = 000000E260F2B000]
23:36:56 INFO - PROCESS | 3252 | 1477636616539 Marionette DEBUG loaded listener.js
23:36:56 INFO - PROCESS | 3252 | ++DOMWINDOW == 84 (000000E25E185000) [pid = 3252] [serial = 176] [outer = 000000E260F2B000]
23:36:56 INFO - PROCESS | 3252 | 1477636616943 Marionette TRACE conn5 <- [1,251,null,{"value":["/XMLHttpRequest/open-after-abort.htm",0,null,null,[["XMLHttpRequest: open() after abort()",0,null,null]]]}]
23:36:56 INFO - .
23:36:56 INFO - TEST-OK | /XMLHttpRequest/open-after-abort.htm | took 776ms
23:36:56 INFO - PROCESS | 3252 | 1477636616985 Marionette TRACE conn5 -> [0,252,"getWindowHandle",null]
23:36:56 INFO - PROCESS | 3252 | 1477636616991 Marionette TRACE conn5 <- [1,252,null,{"value":"13"}]
23:36:56 INFO - TEST-START | /XMLHttpRequest/open-after-setrequestheader.htm
23:36:56 INFO - PROCESS | 3252 | 1477636616996 Marionette TRACE conn5 -> [0,253,"executeScript",{"scriptTimeout":null,"newSandbox":true,"args":[],"filename":"executormarionette.py","script":"if (window.wrappedJSObject.win) {window.wrappedJSObject.win.close()}","sandbox":"default","line":430}]
23:36:57 INFO - PROCESS | 3252 | 1477636617113 Marionette TRACE conn5 <- [1,253,null,{"value":null}]
23:36:57 INFO - PROCESS | 3252 | 1477636617178 Marionette TRACE conn5 -> [0,254,"getWindowHandles",null]
23:36:57 INFO - PROCESS | 3252 | 1477636617181 Marionette TRACE conn5 <- [1,254,null,["13"]]
23:36:57 INFO - PROCESS | 3252 | 1477636617185 Marionette TRACE conn5 -> [0,255,"switchToWindow",{"name":"13"}]
23:36:57 INFO - PROCESS | 3252 | 1477636617191 Marionette TRACE conn5 <- [1,255,null,{}]
23:36:57 INFO - PROCESS | 3252 | 1477636617244 Marionette TRACE conn5 -> [0,256,"executeAsyncScript",{"scriptTimeout":null,"sandbox":"default","debug_script":false,"script":"/* This Source Code Form is subject to the terms of the Mozilla Public\n * License, v. 2.0. If a copy of the MPL was not distributed with this\n * file, You can obtain one at http://mozilla.org/MPL/2.0/. */\n\nwindow.wrappedJSObject.timeout_multiplier = 3;\nwindow.wrappedJSObject.explicit_timeout = 0;\n\nwindow.wrappedJSObject.addEventListener(\"message\", function listener(event) {\n if (event.data.type != \"complete\") {\n return;\n }\n window.wrappedJSObject.removeEventListener(\"message\", listener);\n clearTimeout(timer);\n var tests = event.data.tests;\n var status = event.data.status;\n\n var subtest_results = tests.map(function(x) {\n return [x.name, x.status, x.message, x.stack]\n });\n\n marionetteScriptFinished([\"/XMLHttpRequest/open-after-setrequestheader.htm\",\n status.status,\n status.message,\n status.stack,\n subtest_results]);\n}, false);\n\nwindow.wrappedJSObject.win = window.open(\"http://web-platform.test:8000/XMLHttpRequest/open-after-setrequestheader.htm\", \"9298bc64-aba3-4cf2-8943-12823d317f6b\");\n\nvar timer = null;\nif (30000) {\n timer = setTimeout(function() {\n log(\"Timeout fired\");\n window.wrappedJSObject.win.timeout();\n }, 30000);\n}\n","newSandbox":false,"line":445,"args":[],"filename":"executormarionette.py"}]
23:36:57 INFO - PROCESS | 3252 | ++DOCSHELL 000000E25A13A800 == 52 [pid = 3252] [id = 60]
23:36:57 INFO - PROCESS | 3252 | ++DOMWINDOW == 85 (000000E25A2D5800) [pid = 3252] [serial = 177] [outer = 0000000000000000]
23:36:57 INFO - PROCESS | 3252 | ++DOMWINDOW == 86 (000000E25F7C7800) [pid = 3252] [serial = 178] [outer = 000000E25A2D5800]
23:36:57 INFO - PROCESS | 3252 | 1477636617313 Marionette DEBUG loaded listener.js
23:36:57 INFO - PROCESS | 3252 | ++DOMWINDOW == 87 (000000E25F7D1800) [pid = 3252] [serial = 179] [outer = 000000E25A2D5800]
23:36:57 INFO - PROCESS | 3252 | 1477636617902 Marionette TRACE conn5 <- [1,256,null,{"value":["/XMLHttpRequest/open-after-setrequestheader.htm",0,null,null,[["XMLHttpRequest: open() after setRequestHeader()",0,null,null]]]}]
23:36:57 INFO - .
23:36:57 INFO - TEST-OK | /XMLHttpRequest/open-after-setrequestheader.htm | took 923ms
23:36:57 INFO - PROCESS | 3252 | 1477636617922 Marionette TRACE conn5 -> [0,257,"getWindowHandle",null]
23:36:57 INFO - PROCESS | 3252 | 1477636617926 Marionette TRACE conn5 <- [1,257,null,{"value":"13"}]
23:36:57 INFO - TEST-START | /XMLHttpRequest/open-during-abort.htm
23:36:57 INFO - PROCESS | 3252 | 1477636617934 Marionette TRACE conn5 -> [0,258,"executeScript",{"scriptTimeout":null,"newSandbox":true,"args":[],"filename":"executormarionette.py","script":"if (window.wrappedJSObject.win) {window.wrappedJSObject.win.close()}","sandbox":"default","line":430}]
23:36:58 INFO - PROCESS | 3252 | 1477636618060 Marionette TRACE conn5 <- [1,258,null,{"value":null}]
23:36:58 INFO - PROCESS | 3252 | 1477636618125 Marionette TRACE conn5 -> [0,259,"getWindowHandles",null]
23:36:58 INFO - PROCESS | 3252 | 1477636618128 Marionette TRACE conn5 <- [1,259,null,["13"]]
23:36:58 INFO - PROCESS | 3252 | 1477636618132 Marionette TRACE conn5 -> [0,260,"switchToWindow",{"name":"13"}]
23:36:58 INFO - PROCESS | 3252 | 1477636618137 Marionette TRACE conn5 <- [1,260,null,{}]
23:36:58 INFO - PROCESS | 3252 | 1477636618141 Marionette TRACE conn5 -> [0,261,"executeAsyncScript",{"scriptTimeout":null,"sandbox":"default","debug_script":false,"script":"/* This Source Code Form is subject to the terms of the Mozilla Public\n * License, v. 2.0. If a copy of the MPL was not distributed with this\n * file, You can obtain one at http://mozilla.org/MPL/2.0/. */\n\nwindow.wrappedJSObject.timeout_multiplier = 3;\nwindow.wrappedJSObject.explicit_timeout = 0;\n\nwindow.wrappedJSObject.addEventListener(\"message\", function listener(event) {\n if (event.data.type != \"complete\") {\n return;\n }\n window.wrappedJSObject.removeEventListener(\"message\", listener);\n clearTimeout(timer);\n var tests = event.data.tests;\n var status = event.data.status;\n\n var subtest_results = tests.map(function(x) {\n return [x.name, x.status, x.message, x.stack]\n });\n\n marionetteScriptFinished([\"/XMLHttpRequest/open-during-abort.htm\",\n status.status,\n status.message,\n status.stack,\n subtest_results]);\n}, false);\n\nwindow.wrappedJSObject.win = window.open(\"http://web-platform.test:8000/XMLHttpRequest/open-during-abort.htm\", \"9298bc64-aba3-4cf2-8943-12823d317f6b\");\n\nvar timer = null;\nif (30000) {\n timer = setTimeout(function() {\n log(\"Timeout fired\");\n window.wrappedJSObject.win.timeout();\n }, 30000);\n}\n","newSandbox":false,"line":445,"args":[],"filename":"executormarionette.py"}]
23:36:58 INFO - PROCESS | 3252 | ++DOCSHELL 000000E24DECE800 == 53 [pid = 3252] [id = 61]
23:36:58 INFO - PROCESS | 3252 | ++DOMWINDOW == 88 (000000E24DEDD000) [pid = 3252] [serial = 180] [outer = 0000000000000000]
23:36:58 INFO - PROCESS | 3252 | ++DOMWINDOW == 89 (000000E252923000) [pid = 3252] [serial = 181] [outer = 000000E24DEDD000]
23:36:58 INFO - PROCESS | 3252 | 1477636618247 Marionette DEBUG loaded listener.js
23:36:58 INFO - PROCESS | 3252 | ++DOMWINDOW == 90 (000000E25335F800) [pid = 3252] [serial = 182] [outer = 000000E24DEDD000]
23:36:58 INFO - PROCESS | 3252 | 1477636618673 Marionette TRACE conn5 <- [1,261,null,{"value":["/XMLHttpRequest/open-during-abort.htm",0,null,null,[["XMLHttpRequest: open() during abort()",0,null,null]]]}]
23:36:58 INFO - .
23:36:58 INFO - TEST-OK | /XMLHttpRequest/open-during-abort.htm | took 777ms
23:36:58 INFO - PROCESS | 3252 | 1477636618712 Marionette TRACE conn5 -> [0,262,"getWindowHandle",null]
23:36:58 INFO - TEST-START | /XMLHttpRequest/open-method-bogus.htm
23:36:58 INFO - PROCESS | 3252 | 1477636618716 Marionette TRACE conn5 <- [1,262,null,{"value":"13"}]
23:36:58 INFO - PROCESS | 3252 | 1477636618736 Marionette TRACE conn5 -> [0,263,"executeScript",{"scriptTimeout":null,"newSandbox":true,"args":[],"filename":"executormarionette.py","script":"if (window.wrappedJSObject.win) {window.wrappedJSObject.win.close()}","sandbox":"default","line":430}]
23:36:58 INFO - PROCESS | 3252 | 1477636618837 Marionette TRACE conn5 <- [1,263,null,{"value":null}]
23:36:58 INFO - PROCESS | 3252 | --DOCSHELL 000000E25B139000 == 52 [pid = 3252] [id = 34]
23:36:58 INFO - PROCESS | 3252 | --DOCSHELL 000000E25E0D3800 == 51 [pid = 3252] [id = 35]
23:36:58 INFO - PROCESS | 3252 | --DOCSHELL 000000E256F0E800 == 50 [pid = 3252] [id = 33]
23:36:58 INFO - PROCESS | 3252 | --DOCSHELL 000000E2525FB000 == 49 [pid = 3252] [id = 32]
23:36:58 INFO - PROCESS | 3252 | --DOCSHELL 000000E2610AE800 == 48 [pid = 3252] [id = 56]
23:36:58 INFO - PROCESS | 3252 | --DOCSHELL 000000E260F1D800 == 47 [pid = 3252] [id = 55]
23:36:58 INFO - PROCESS | 3252 | --DOCSHELL 000000E261C8D800 == 46 [pid = 3252] [id = 54]
23:36:58 INFO - PROCESS | 3252 | --DOCSHELL 000000E261B2B000 == 45 [pid = 3252] [id = 53]
23:36:58 INFO - PROCESS | 3252 | --DOCSHELL 000000E261524800 == 44 [pid = 3252] [id = 52]
23:36:58 INFO - PROCESS | 3252 | --DOCSHELL 000000E254514800 == 43 [pid = 3252] [id = 51]
23:36:58 INFO - PROCESS | 3252 | --DOCSHELL 000000E260E93800 == 42 [pid = 3252] [id = 50]
23:36:58 INFO - PROCESS | 3252 | --DOCSHELL 000000E25F586000 == 41 [pid = 3252] [id = 49]
23:36:58 INFO - PROCESS | 3252 | --DOCSHELL 000000E25B628800 == 40 [pid = 3252] [id = 48]
23:36:58 INFO - PROCESS | 3252 | --DOCSHELL 000000E258588800 == 39 [pid = 3252] [id = 47]
23:36:58 INFO - PROCESS | 3252 | --DOCSHELL 000000E25292C800 == 38 [pid = 3252] [id = 46]
23:36:58 INFO - PROCESS | 3252 | --DOCSHELL 000000E260D93800 == 37 [pid = 3252] [id = 36]
23:36:58 INFO - PROCESS | 3252 | --DOCSHELL 000000E25AEDD800 == 36 [pid = 3252] [id = 40]
23:36:58 INFO - PROCESS | 3252 | --DOMWINDOW == 89 (000000E25A9C6000) [pid = 3252] [serial = 116] [outer = 0000000000000000] [url = about:blank]
23:36:58 INFO - PROCESS | 3252 | --DOMWINDOW == 88 (000000E25A2C3800) [pid = 3252] [serial = 115] [outer = 0000000000000000] [url = about:blank]
23:36:58 INFO - PROCESS | 3252 | --DOMWINDOW == 87 (000000E256F1C800) [pid = 3252] [serial = 112] [outer = 0000000000000000] [url = about:blank]
23:36:58 INFO - PROCESS | 3252 | --DOMWINDOW == 86 (000000E258114800) [pid = 3252] [serial = 113] [outer = 0000000000000000] [url = about:blank]
23:36:58 INFO - PROCESS | 3252 | --DOMWINDOW == 85 (000000E25305D000) [pid = 3252] [serial = 109] [outer = 0000000000000000] [url = about:blank]
23:36:58 INFO - PROCESS | 3252 | --DOMWINDOW == 84 (000000E25335A000) [pid = 3252] [serial = 110] [outer = 0000000000000000] [url = about:blank]
23:36:58 INFO - PROCESS | 3252 | --DOMWINDOW == 83 (000000E260EA0800) [pid = 3252] [serial = 107] [outer = 0000000000000000] [url = about:blank]
23:36:58 INFO - PROCESS | 3252 | --DOMWINDOW == 82 (000000E25AEE7800) [pid = 3252] [serial = 118] [outer = 0000000000000000] [url = about:blank]
23:36:58 INFO - PROCESS | 3252 | 1477636618932 Marionette TRACE conn5 -> [0,264,"getWindowHandles",null]
23:36:58 INFO - PROCESS | 3252 | 1477636618935 Marionette TRACE conn5 <- [1,264,null,["13"]]
23:36:58 INFO - PROCESS | 3252 | 1477636618940 Marionette TRACE conn5 -> [0,265,"switchToWindow",{"name":"13"}]
23:36:58 INFO - PROCESS | 3252 | 1477636618944 Marionette TRACE conn5 <- [1,265,null,{}]
23:36:58 INFO - PROCESS | 3252 | 1477636618948 Marionette TRACE conn5 -> [0,266,"executeAsyncScript",{"scriptTimeout":null,"sandbox":"default","debug_script":false,"script":"/* This Source Code Form is subject to the terms of the Mozilla Public\n * License, v. 2.0. If a copy of the MPL was not distributed with this\n * file, You can obtain one at http://mozilla.org/MPL/2.0/. */\n\nwindow.wrappedJSObject.timeout_multiplier = 3;\nwindow.wrappedJSObject.explicit_timeout = 0;\n\nwindow.wrappedJSObject.addEventListener(\"message\", function listener(event) {\n if (event.data.type != \"complete\") {\n return;\n }\n window.wrappedJSObject.removeEventListener(\"message\", listener);\n clearTimeout(timer);\n var tests = event.data.tests;\n var status = event.data.status;\n\n var subtest_results = tests.map(function(x) {\n return [x.name, x.status, x.message, x.stack]\n });\n\n marionetteScriptFinished([\"/XMLHttpRequest/open-method-bogus.htm\",\n status.status,\n status.message,\n status.stack,\n subtest_results]);\n}, false);\n\nwindow.wrappedJSObject.win = window.open(\"http://web-platform.test:8000/XMLHttpRequest/open-method-bogus.htm\", \"9298bc64-aba3-4cf2-8943-12823d317f6b\");\n\nvar timer = null;\nif (30000) {\n timer = setTimeout(function() {\n log(\"Timeout fired\");\n window.wrappedJSObject.win.timeout();\n }, 30000);\n}\n","newSandbox":false,"line":445,"args":[],"filename":"executormarionette.py"}]
23:36:58 INFO - PROCESS | 3252 | ++DOCSHELL 000000E25305D000 == 37 [pid = 3252] [id = 62]
23:36:58 INFO - PROCESS | 3252 | ++DOMWINDOW == 83 (000000E25327A000) [pid = 3252] [serial = 183] [outer = 0000000000000000]
23:36:59 INFO - PROCESS | 3252 | ++DOMWINDOW == 84 (000000E254311000) [pid = 3252] [serial = 184] [outer = 000000E25327A000]
23:36:59 INFO - PROCESS | 3252 | 1477636619006 Marionette DEBUG loaded listener.js
23:36:59 INFO - PROCESS | 3252 | ++DOMWINDOW == 85 (000000E256F1C800) [pid = 3252] [serial = 185] [outer = 000000E25327A000]
23:36:59 INFO - PROCESS | 3252 | [3252] WARNING: 'NS_FAILED(rv)', file c:/builds/moz2_slave/fx-team-w64-d-0000000000000000/build/src/dom/xhr/XMLHttpRequestMainThread.cpp, line 1459
23:36:59 INFO - PROCESS | 3252 | [3252] WARNING: 'NS_FAILED(rv)', file c:/builds/moz2_slave/fx-team-w64-d-0000000000000000/build/src/dom/xhr/XMLHttpRequestMainThread.cpp, line 1459
23:36:59 INFO - PROCESS | 3252 | [3252] WARNING: 'NS_FAILED(rv)', file c:/builds/moz2_slave/fx-team-w64-d-0000000000000000/build/src/dom/xhr/XMLHttpRequestMainThread.cpp, line 1459
23:36:59 INFO - PROCESS | 3252 | [3252] WARNING: 'NS_FAILED(rv)', file c:/builds/moz2_slave/fx-team-w64-d-0000000000000000/build/src/dom/xhr/XMLHttpRequestMainThread.cpp, line 1459
23:36:59 INFO - PROCESS | 3252 | [3252] WARNING: 'NS_FAILED(rv)', file c:/builds/moz2_slave/fx-team-w64-d-0000000000000000/build/src/dom/xhr/XMLHttpRequestMainThread.cpp, line 1459
23:36:59 INFO - PROCESS | 3252 | [3252] WARNING: 'NS_FAILED(rv)', file c:/builds/moz2_slave/fx-team-w64-d-0000000000000000/build/src/dom/xhr/XMLHttpRequestMainThread.cpp, line 1459
23:36:59 INFO - PROCESS | 3252 | [3252] WARNING: 'NS_FAILED(rv)', file c:/builds/moz2_slave/fx-team-w64-d-0000000000000000/build/src/dom/xhr/XMLHttpRequestMainThread.cpp, line 1459
23:36:59 INFO - PROCESS | 3252 | [3252] WARNING: 'NS_FAILED(rv)', file c:/builds/moz2_slave/fx-team-w64-d-0000000000000000/build/src/dom/xhr/XMLHttpRequestMainThread.cpp, line 1459
23:36:59 INFO - PROCESS | 3252 | 1477636619327 Marionette TRACE conn5 <- [1,266,null,{"value":["/XMLHttpRequest/open-method-bogus.htm",0,null,null,[["XMLHttpRequest: open() - bogus methods ()",0,null,null],["XMLHttpRequest: open() - bogus methods (>)",0,null,null],["XMLHttpRequest: open() - bogus methods ( GET)",0,null,null],["XMLHttpRequest: open() - bogus methods (G T)",0,null,null],["XMLHttpRequest: open() - bogus methods (@GET)",0,null,null],["XMLHttpRequest: open() - bogus methods (G:ET)",0,null,null],["XMLHttpRequest: open() - bogus methods (GET?)",0,null,null],["XMLHttpRequest: open() - bogus methods (GET\n)",0,null,null]]]}]
23:36:59 INFO - ........
23:36:59 INFO - TEST-OK | /XMLHttpRequest/open-method-bogus.htm | took 630ms
23:36:59 INFO - PROCESS | 3252 | 1477636619357 Marionette TRACE conn5 -> [0,267,"getWindowHandle",null]
23:36:59 INFO - PROCESS | 3252 | 1477636619362 Marionette TRACE conn5 <- [1,267,null,{"value":"13"}]
23:36:59 INFO - TEST-START | /XMLHttpRequest/open-method-case-insensitive.htm
23:36:59 INFO - PROCESS | 3252 | 1477636619366 Marionette TRACE conn5 -> [0,268,"executeScript",{"scriptTimeout":null,"newSandbox":true,"args":[],"filename":"executormarionette.py","script":"if (window.wrappedJSObject.win) {window.wrappedJSObject.win.close()}","sandbox":"default","line":430}]
23:36:59 INFO - PROCESS | 3252 | 1477636619481 Marionette TRACE conn5 <- [1,268,null,{"value":null}]
23:36:59 INFO - PROCESS | 3252 | 1477636619544 Marionette TRACE conn5 -> [0,269,"getWindowHandles",null]
23:36:59 INFO - PROCESS | 3252 | 1477636619547 Marionette TRACE conn5 <- [1,269,null,["13"]]
23:36:59 INFO - PROCESS | 3252 | 1477636619551 Marionette TRACE conn5 -> [0,270,"switchToWindow",{"name":"13"}]
23:36:59 INFO - PROCESS | 3252 | 1477636619556 Marionette TRACE conn5 <- [1,270,null,{}]
23:36:59 INFO - PROCESS | 3252 | 1477636619559 Marionette TRACE conn5 -> [0,271,"executeAsyncScript",{"scriptTimeout":null,"sandbox":"default","debug_script":false,"script":"/* This Source Code Form is subject to the terms of the Mozilla Public\n * License, v. 2.0. If a copy of the MPL was not distributed with this\n * file, You can obtain one at http://mozilla.org/MPL/2.0/. */\n\nwindow.wrappedJSObject.timeout_multiplier = 3;\nwindow.wrappedJSObject.explicit_timeout = 0;\n\nwindow.wrappedJSObject.addEventListener(\"message\", function listener(event) {\n if (event.data.type != \"complete\") {\n return;\n }\n window.wrappedJSObject.removeEventListener(\"message\", listener);\n clearTimeout(timer);\n var tests = event.data.tests;\n var status = event.data.status;\n\n var subtest_results = tests.map(function(x) {\n return [x.name, x.status, x.message, x.stack]\n });\n\n marionetteScriptFinished([\"/XMLHttpRequest/open-method-case-insensitive.htm\",\n status.status,\n status.message,\n status.stack,\n subtest_results]);\n}, false);\n\nwindow.wrappedJSObject.win = window.open(\"http://web-platform.test:8000/XMLHttpRequest/open-method-case-insensitive.htm\", \"9298bc64-aba3-4cf2-8943-12823d317f6b\");\n\nvar timer = null;\nif (30000) {\n timer = setTimeout(function() {\n log(\"Timeout fired\");\n window.wrappedJSObject.win.timeout();\n }, 30000);\n}\n","newSandbox":false,"line":445,"args":[],"filename":"executormarionette.py"}]
23:36:59 INFO - PROCESS | 3252 | ++DOCSHELL 000000E24DEDB800 == 38 [pid = 3252] [id = 63]
23:36:59 INFO - PROCESS | 3252 | ++DOMWINDOW == 86 (000000E258112000) [pid = 3252] [serial = 186] [outer = 0000000000000000]
23:36:59 INFO - PROCESS | 3252 | ++DOMWINDOW == 87 (000000E25A2D6800) [pid = 3252] [serial = 187] [outer = 000000E258112000]
23:36:59 INFO - PROCESS | 3252 | 1477636619617 Marionette DEBUG loaded listener.js
23:36:59 INFO - PROCESS | 3252 | ++DOMWINDOW == 88 (000000E25856C000) [pid = 3252] [serial = 188] [outer = 000000E258112000]
23:36:59 INFO - PROCESS | 3252 | 1477636619962 Marionette TRACE conn5 <- [1,271,null,{"value":["/XMLHttpRequest/open-method-case-insensitive.htm",0,null,null,[["XMLHttpRequest: open() - case-insensitive methods test (DELETE)",0,null,null],["XMLHttpRequest: open() - case-insensitive methods test (GET)",0,null,null],["XMLHttpRequest: open() - case-insensitive methods test (HEAD)",0,null,null],["XMLHttpRequest: open() - case-insensitive methods test (OPTIONS)",0,null,null],["XMLHttpRequest: open() - case-insensitive methods test (POST)",0,null,null],["XMLHttpRequest: open() - case-insensitive methods test (PUT)",0,null,null]]]}]
23:37:00 INFO - ......
23:37:00 INFO - TEST-OK | /XMLHttpRequest/open-method-case-insensitive.htm | took 627ms
23:37:00 INFO - PROCESS | 3252 | 1477636619998 Marionette TRACE conn5 -> [0,272,"getWindowHandle",null]
23:37:00 INFO - PROCESS | 3252 | 1477636620001 Marionette TRACE conn5 <- [1,272,null,{"value":"13"}]
23:37:00 INFO - TEST-START | /XMLHttpRequest/open-method-case-sensitive.htm
23:37:00 INFO - PROCESS | 3252 | 1477636620006 Marionette TRACE conn5 -> [0,273,"executeScript",{"scriptTimeout":null,"newSandbox":true,"args":[],"filename":"executormarionette.py","script":"if (window.wrappedJSObject.win) {window.wrappedJSObject.win.close()}","sandbox":"default","line":430}]
23:37:00 INFO - PROCESS | 3252 | 1477636620121 Marionette TRACE conn5 <- [1,273,null,{"value":null}]
23:37:00 INFO - PROCESS | 3252 | 1477636620185 Marionette TRACE conn5 -> [0,274,"getWindowHandles",null]
23:37:00 INFO - PROCESS | 3252 | 1477636620187 Marionette TRACE conn5 <- [1,274,null,["13"]]
23:37:00 INFO - PROCESS | 3252 | 1477636620191 Marionette TRACE conn5 -> [0,275,"switchToWindow",{"name":"13"}]
23:37:00 INFO - PROCESS | 3252 | 1477636620194 Marionette TRACE conn5 <- [1,275,null,{}]
23:37:00 INFO - PROCESS | 3252 | 1477636620197 Marionette TRACE conn5 -> [0,276,"executeAsyncScript",{"scriptTimeout":null,"sandbox":"default","debug_script":false,"script":"/* This Source Code Form is subject to the terms of the Mozilla Public\n * License, v. 2.0. If a copy of the MPL was not distributed with this\n * file, You can obtain one at http://mozilla.org/MPL/2.0/. */\n\nwindow.wrappedJSObject.timeout_multiplier = 3;\nwindow.wrappedJSObject.explicit_timeout = 0;\n\nwindow.wrappedJSObject.addEventListener(\"message\", function listener(event) {\n if (event.data.type != \"complete\") {\n return;\n }\n window.wrappedJSObject.removeEventListener(\"message\", listener);\n clearTimeout(timer);\n var tests = event.data.tests;\n var status = event.data.status;\n\n var subtest_results = tests.map(function(x) {\n return [x.name, x.status, x.message, x.stack]\n });\n\n marionetteScriptFinished([\"/XMLHttpRequest/open-method-case-sensitive.htm\",\n status.status,\n status.message,\n status.stack,\n subtest_results]);\n}, false);\n\nwindow.wrappedJSObject.win = window.open(\"http://web-platform.test:8000/XMLHttpRequest/open-method-case-sensitive.htm\", \"9298bc64-aba3-4cf2-8943-12823d317f6b\");\n\nvar timer = null;\nif (30000) {\n timer = setTimeout(function() {\n log(\"Timeout fired\");\n window.wrappedJSObject.win.timeout();\n }, 30000);\n}\n","newSandbox":false,"line":445,"args":[],"filename":"executormarionette.py"}]
23:37:00 INFO - PROCESS | 3252 | ++DOCSHELL 000000E25B13E800 == 39 [pid = 3252] [id = 64]
23:37:00 INFO - PROCESS | 3252 | ++DOMWINDOW == 89 (000000E25B13F800) [pid = 3252] [serial = 189] [outer = 0000000000000000]
23:37:00 INFO - PROCESS | 3252 | ++DOMWINDOW == 90 (000000E25B37D000) [pid = 3252] [serial = 190] [outer = 000000E25B13F800]
23:37:00 INFO - PROCESS | 3252 | 1477636620252 Marionette DEBUG loaded listener.js
23:37:00 INFO - PROCESS | 3252 | ++DOMWINDOW == 91 (000000E25B84A000) [pid = 3252] [serial = 191] [outer = 000000E25B13F800]
23:37:00 INFO - PROCESS | 3252 | 1477636620582 Marionette TRACE conn5 <- [1,276,null,{"value":["/XMLHttpRequest/open-method-case-sensitive.htm",0,null,null,[["XMLHttpRequest: open() - case-sensitive methods test (XUNICORN)",0,null,null],["XMLHttpRequest: open() - case-sensitive methods test (xUNIcorn)",0,null,null],["XMLHttpRequest: open() - case-sensitive methods test (chiCKEN)",0,null,null],["XMLHttpRequest: open() - case-sensitive methods test (PATCH)",0,null,null],["XMLHttpRequest: open() - case-sensitive methods test (patCH)",0,null,null],["XMLHttpRequest: open() - case-sensitive methods test (copy)",0,null,null],["XMLHttpRequest: open() - case-sensitive methods test (COpy)",0,null,null],["XMLHttpRequest: open() - case-sensitive methods test (inDEX)",0,null,null],["XMLHttpRequest: open() - case-sensitive methods test (movE)",0,null,null]]]}]
23:37:00 INFO - .........
23:37:00 INFO - TEST-OK | /XMLHttpRequest/open-method-case-sensitive.htm | took 630ms
23:37:00 INFO - TEST-START | /XMLHttpRequest/open-method-insecure.htm
23:37:00 INFO - PROCESS | 3252 | 1477636620639 Marionette TRACE conn5 -> [0,277,"getWindowHandle",null]
23:37:00 INFO - PROCESS | 3252 | 1477636620641 Marionette TRACE conn5 <- [1,277,null,{"value":"13"}]
23:37:00 INFO - PROCESS | 3252 | 1477636620645 Marionette TRACE conn5 -> [0,278,"executeScript",{"scriptTimeout":null,"newSandbox":true,"args":[],"filename":"executormarionette.py","script":"if (window.wrappedJSObject.win) {window.wrappedJSObject.win.close()}","sandbox":"default","line":430}]
23:37:00 INFO - PROCESS | 3252 | 1477636620769 Marionette TRACE conn5 <- [1,278,null,{"value":null}]
23:37:00 INFO - PROCESS | 3252 | 1477636620775 Marionette TRACE conn5 -> [0,279,"getWindowHandles",null]
23:37:00 INFO - PROCESS | 3252 | 1477636620778 Marionette TRACE conn5 <- [1,279,null,["13"]]
23:37:00 INFO - PROCESS | 3252 | 1477636620818 Marionette TRACE conn5 -> [0,280,"switchToWindow",{"name":"13"}]
23:37:00 INFO - PROCESS | 3252 | 1477636620822 Marionette TRACE conn5 <- [1,280,null,{}]
23:37:00 INFO - PROCESS | 3252 | 1477636620825 Marionette TRACE conn5 -> [0,281,"executeAsyncScript",{"scriptTimeout":null,"sandbox":"default","debug_script":false,"script":"/* This Source Code Form is subject to the terms of the Mozilla Public\n * License, v. 2.0. If a copy of the MPL was not distributed with this\n * file, You can obtain one at http://mozilla.org/MPL/2.0/. */\n\nwindow.wrappedJSObject.timeout_multiplier = 3;\nwindow.wrappedJSObject.explicit_timeout = 0;\n\nwindow.wrappedJSObject.addEventListener(\"message\", function listener(event) {\n if (event.data.type != \"complete\") {\n return;\n }\n window.wrappedJSObject.removeEventListener(\"message\", listener);\n clearTimeout(timer);\n var tests = event.data.tests;\n var status = event.data.status;\n\n var subtest_results = tests.map(function(x) {\n return [x.name, x.status, x.message, x.stack]\n });\n\n marionetteScriptFinished([\"/XMLHttpRequest/open-method-insecure.htm\",\n status.status,\n status.message,\n status.stack,\n subtest_results]);\n}, false);\n\nwindow.wrappedJSObject.win = window.open(\"http://web-platform.test:8000/XMLHttpRequest/open-method-insecure.htm\", \"9298bc64-aba3-4cf2-8943-12823d317f6b\");\n\nvar timer = null;\nif (30000) {\n timer = setTimeout(function() {\n log(\"Timeout fired\");\n window.wrappedJSObject.win.timeout();\n }, 30000);\n}\n","newSandbox":false,"line":445,"args":[],"filename":"executormarionette.py"}]
23:37:00 INFO - PROCESS | 3252 | ++DOCSHELL 000000E25B848000 == 40 [pid = 3252] [id = 65]
23:37:00 INFO - PROCESS | 3252 | ++DOMWINDOW == 92 (000000E25DD26000) [pid = 3252] [serial = 192] [outer = 0000000000000000]
23:37:00 INFO - PROCESS | 3252 | ++DOMWINDOW == 93 (000000E25E17E800) [pid = 3252] [serial = 193] [outer = 000000E25DD26000]
23:37:00 INFO - PROCESS | 3252 | 1477636620879 Marionette DEBUG loaded listener.js
23:37:00 INFO - PROCESS | 3252 | ++DOMWINDOW == 94 (000000E25F582000) [pid = 3252] [serial = 194] [outer = 000000E25DD26000]
23:37:01 INFO - PROCESS | 3252 | [3252] WARNING: 'NS_FAILED(rv)', file c:/builds/moz2_slave/fx-team-w64-d-0000000000000000/build/src/dom/xhr/XMLHttpRequestMainThread.cpp, line 1459
23:37:01 INFO - PROCESS | 3252 | [3252] WARNING: 'NS_FAILED(rv)', file c:/builds/moz2_slave/fx-team-w64-d-0000000000000000/build/src/dom/xhr/XMLHttpRequestMainThread.cpp, line 1459
23:37:01 INFO - PROCESS | 3252 | [3252] WARNING: 'NS_FAILED(rv)', file c:/builds/moz2_slave/fx-team-w64-d-0000000000000000/build/src/dom/xhr/XMLHttpRequestMainThread.cpp, line 1459
23:37:01 INFO - PROCESS | 3252 | [3252] WARNING: 'NS_FAILED(rv)', file c:/builds/moz2_slave/fx-team-w64-d-0000000000000000/build/src/dom/xhr/XMLHttpRequestMainThread.cpp, line 1459
23:37:01 INFO - PROCESS | 3252 | [3252] WARNING: 'NS_FAILED(rv)', file c:/builds/moz2_slave/fx-team-w64-d-0000000000000000/build/src/dom/xhr/XMLHttpRequestMainThread.cpp, line 1459
23:37:01 INFO - PROCESS | 3252 | [3252] WARNING: 'NS_FAILED(rv)', file c:/builds/moz2_slave/fx-team-w64-d-0000000000000000/build/src/dom/xhr/XMLHttpRequestMainThread.cpp, line 1459
23:37:01 INFO - PROCESS | 3252 | [3252] WARNING: 'NS_FAILED(rv)', file c:/builds/moz2_slave/fx-team-w64-d-0000000000000000/build/src/dom/xhr/XMLHttpRequestMainThread.cpp, line 1459
23:37:01 INFO - PROCESS | 3252 | [3252] WARNING: 'NS_FAILED(rv)', file c:/builds/moz2_slave/fx-team-w64-d-0000000000000000/build/src/dom/xhr/XMLHttpRequestMainThread.cpp, line 1459
23:37:01 INFO - PROCESS | 3252 | [3252] WARNING: 'NS_FAILED(rv)', file c:/builds/moz2_slave/fx-team-w64-d-0000000000000000/build/src/dom/xhr/XMLHttpRequestMainThread.cpp, line 1459
23:37:01 INFO - PROCESS | 3252 | 1477636621271 Marionette TRACE conn5 <- [1,281,null,{"value":["/XMLHttpRequest/open-method-insecure.htm",0,null,null,[["XMLHttpRequest: open() - \"insecure\" methods (track)",0,null,null],["XMLHttpRequest: open() - \"insecure\" methods (TRACK)",0,null,null],["XMLHttpRequest: open() - \"insecure\" methods (trAck)",0,null,null],["XMLHttpRequest: open() - \"insecure\" methods (TRACE)",0,null,null],["XMLHttpRequest: open() - \"insecure\" methods (trace)",0,null,null],["XMLHttpRequest: open() - \"insecure\" methods (traCE)",0,null,null],["XMLHttpRequest: open() - \"insecure\" methods (connect)",0,null,null],["XMLHttpRequest: open() - \"insecure\" methods (CONNECT)",0,null,null],["XMLHttpRequest: open() - \"insecure\" methods (connECT)",0,null,null]]]}]
23:37:01 INFO - .........
23:37:01 INFO - TEST-OK | /XMLHttpRequest/open-method-insecure.htm | took 672ms
23:37:01 INFO - PROCESS | 3252 | 1477636621317 Marionette TRACE conn5 -> [0,282,"getWindowHandle",null]
23:37:01 INFO - PROCESS | 3252 | 1477636621320 Marionette TRACE conn5 <- [1,282,null,{"value":"13"}]
23:37:01 INFO - TEST-START | /XMLHttpRequest/open-method-responsetype-set-sync.htm
23:37:01 INFO - PROCESS | 3252 | 1477636621325 Marionette TRACE conn5 -> [0,283,"executeScript",{"scriptTimeout":null,"newSandbox":true,"args":[],"filename":"executormarionette.py","script":"if (window.wrappedJSObject.win) {window.wrappedJSObject.win.close()}","sandbox":"default","line":430}]
23:37:01 INFO - PROCESS | 3252 | 1477636621469 Marionette TRACE conn5 <- [1,283,null,{"value":null}]
23:37:01 INFO - PROCESS | 3252 | 1477636621474 Marionette TRACE conn5 -> [0,284,"getWindowHandles",null]
23:37:01 INFO - PROCESS | 3252 | 1477636621477 Marionette TRACE conn5 <- [1,284,null,["13"]]
23:37:01 INFO - PROCESS | 3252 | 1477636621480 Marionette TRACE conn5 -> [0,285,"switchToWindow",{"name":"13"}]
23:37:01 INFO - PROCESS | 3252 | 1477636621483 Marionette TRACE conn5 <- [1,285,null,{}]
23:37:01 INFO - PROCESS | 3252 | 1477636621523 Marionette TRACE conn5 -> [0,286,"executeAsyncScript",{"scriptTimeout":null,"sandbox":"default","debug_script":false,"script":"/* This Source Code Form is subject to the terms of the Mozilla Public\n * License, v. 2.0. If a copy of the MPL was not distributed with this\n * file, You can obtain one at http://mozilla.org/MPL/2.0/. */\n\nwindow.wrappedJSObject.timeout_multiplier = 3;\nwindow.wrappedJSObject.explicit_timeout = 0;\n\nwindow.wrappedJSObject.addEventListener(\"message\", function listener(event) {\n if (event.data.type != \"complete\") {\n return;\n }\n window.wrappedJSObject.removeEventListener(\"message\", listener);\n clearTimeout(timer);\n var tests = event.data.tests;\n var status = event.data.status;\n\n var subtest_results = tests.map(function(x) {\n return [x.name, x.status, x.message, x.stack]\n });\n\n marionetteScriptFinished([\"/XMLHttpRequest/open-method-responsetype-set-sync.htm\",\n status.status,\n status.message,\n status.stack,\n subtest_results]);\n}, false);\n\nwindow.wrappedJSObject.win = window.open(\"http://web-platform.test:8000/XMLHttpRequest/open-method-responsetype-set-sync.htm\", \"9298bc64-aba3-4cf2-8943-12823d317f6b\");\n\nvar timer = null;\nif (30000) {\n timer = setTimeout(function() {\n log(\"Timeout fired\");\n window.wrappedJSObject.win.timeout();\n }, 30000);\n}\n","newSandbox":false,"line":445,"args":[],"filename":"executormarionette.py"}]
23:37:01 INFO - PROCESS | 3252 | ++DOCSHELL 000000E260276000 == 41 [pid = 3252] [id = 66]
23:37:01 INFO - PROCESS | 3252 | ++DOMWINDOW == 95 (000000E260279000) [pid = 3252] [serial = 195] [outer = 0000000000000000]
23:37:01 INFO - PROCESS | 3252 | ++DOMWINDOW == 96 (000000E2604C5000) [pid = 3252] [serial = 196] [outer = 000000E260279000]
23:37:01 INFO - PROCESS | 3252 | 1477636621580 Marionette DEBUG loaded listener.js
23:37:01 INFO - PROCESS | 3252 | ++DOMWINDOW == 97 (000000E25E0BC000) [pid = 3252] [serial = 197] [outer = 000000E260279000]
23:37:01 INFO - PROCESS | 3252 | 1477636621919 Marionette TRACE conn5 <- [1,286,null,{"value":["/XMLHttpRequest/open-method-responsetype-set-sync.htm",0,null,null,[["XMLHttpRequest: open() sync request not allowed if responseType is set (arraybuffer)",0,null,null],["XMLHttpRequest: open() sync request not allowed if responseType is set (blob)",0,null,null],["XMLHttpRequest: open() sync request not allowed if responseType is set (json)",0,null,null],["XMLHttpRequest: open() sync request not allowed if responseType is set (text)",0,null,null],["XMLHttpRequest: open() sync request not allowed if responseType is set (document)",0,null,null]]]}]
23:37:01 INFO - .....
23:37:01 INFO - TEST-OK | /XMLHttpRequest/open-method-responsetype-set-sync.htm | took 628ms
23:37:01 INFO - PROCESS | 3252 | 1477636621958 Marionette TRACE conn5 -> [0,287,"getWindowHandle",null]
23:37:01 INFO - PROCESS | 3252 | 1477636621960 Marionette TRACE conn5 <- [1,287,null,{"value":"13"}]
23:37:01 INFO - TEST-START | /XMLHttpRequest/open-open-send.htm
23:37:01 INFO - PROCESS | 3252 | 1477636621965 Marionette TRACE conn5 -> [0,288,"executeScript",{"scriptTimeout":null,"newSandbox":true,"args":[],"filename":"executormarionette.py","script":"if (window.wrappedJSObject.win) {window.wrappedJSObject.win.close()}","sandbox":"default","line":430}]
23:37:02 INFO - PROCESS | 3252 | 1477636622079 Marionette TRACE conn5 <- [1,288,null,{"value":null}]
23:37:02 INFO - PROCESS | 3252 | 1477636622084 Marionette TRACE conn5 -> [0,289,"getWindowHandles",null]
23:37:02 INFO - PROCESS | 3252 | 1477636622087 Marionette TRACE conn5 <- [1,289,null,["13"]]
23:37:02 INFO - PROCESS | 3252 | 1477636622091 Marionette TRACE conn5 -> [0,290,"switchToWindow",{"name":"13"}]
23:37:02 INFO - PROCESS | 3252 | 1477636622095 Marionette TRACE conn5 <- [1,290,null,{}]
23:37:02 INFO - PROCESS | 3252 | 1477636622136 Marionette TRACE conn5 -> [0,291,"executeAsyncScript",{"scriptTimeout":null,"sandbox":"default","debug_script":false,"script":"/* This Source Code Form is subject to the terms of the Mozilla Public\n * License, v. 2.0. If a copy of the MPL was not distributed with this\n * file, You can obtain one at http://mozilla.org/MPL/2.0/. */\n\nwindow.wrappedJSObject.timeout_multiplier = 3;\nwindow.wrappedJSObject.explicit_timeout = 0;\n\nwindow.wrappedJSObject.addEventListener(\"message\", function listener(event) {\n if (event.data.type != \"complete\") {\n return;\n }\n window.wrappedJSObject.removeEventListener(\"message\", listener);\n clearTimeout(timer);\n var tests = event.data.tests;\n var status = event.data.status;\n\n var subtest_results = tests.map(function(x) {\n return [x.name, x.status, x.message, x.stack]\n });\n\n marionetteScriptFinished([\"/XMLHttpRequest/open-open-send.htm\",\n status.status,\n status.message,\n status.stack,\n subtest_results]);\n}, false);\n\nwindow.wrappedJSObject.win = window.open(\"http://web-platform.test:8000/XMLHttpRequest/open-open-send.htm\", \"9298bc64-aba3-4cf2-8943-12823d317f6b\");\n\nvar timer = null;\nif (30000) {\n timer = setTimeout(function() {\n log(\"Timeout fired\");\n window.wrappedJSObject.win.timeout();\n }, 30000);\n}\n","newSandbox":false,"line":445,"args":[],"filename":"executormarionette.py"}]
23:37:02 INFO - PROCESS | 3252 | ++DOCSHELL 000000E260F18000 == 42 [pid = 3252] [id = 67]
23:37:02 INFO - PROCESS | 3252 | ++DOMWINDOW == 98 (000000E260F1D000) [pid = 3252] [serial = 198] [outer = 0000000000000000]
23:37:02 INFO - PROCESS | 3252 | ++DOMWINDOW == 99 (000000E260F25800) [pid = 3252] [serial = 199] [outer = 000000E260F1D000]
23:37:02 INFO - PROCESS | 3252 | 1477636622189 Marionette DEBUG loaded listener.js
23:37:02 INFO - PROCESS | 3252 | ++DOMWINDOW == 100 (000000E2610CA000) [pid = 3252] [serial = 200] [outer = 000000E260F1D000]
23:37:02 INFO - PROCESS | 3252 | 1477636622515 Marionette TRACE conn5 <- [1,291,null,{"value":["/XMLHttpRequest/open-open-send.htm",0,null,null,[["XMLHttpRequest: open() - open() - send()",0,null,null]]]}]
23:37:02 INFO - .
23:37:02 INFO - TEST-OK | /XMLHttpRequest/open-open-send.htm | took 586ms
23:37:02 INFO - TEST-START | /XMLHttpRequest/open-open-sync-send.htm
23:37:02 INFO - PROCESS | 3252 | 1477636622555 Marionette TRACE conn5 -> [0,292,"getWindowHandle",null]
23:37:02 INFO - PROCESS | 3252 | 1477636622557 Marionette TRACE conn5 <- [1,292,null,{"value":"13"}]
23:37:02 INFO - PROCESS | 3252 | 1477636622561 Marionette TRACE conn5 -> [0,293,"executeScript",{"scriptTimeout":null,"newSandbox":true,"args":[],"filename":"executormarionette.py","script":"if (window.wrappedJSObject.win) {window.wrappedJSObject.win.close()}","sandbox":"default","line":430}]
23:37:03 INFO - PROCESS | 3252 | 1477636623025 Marionette TRACE conn5 <- [1,293,null,{"value":null}]
23:37:03 INFO - PROCESS | 3252 | --DOMWINDOW == 99 (000000E25F586800) [pid = 3252] [serial = 144] [outer = 0000000000000000] [url = http://web-platform.test:8000/XMLHttpRequest/getallresponseheaders-status.htm]
23:37:03 INFO - PROCESS | 3252 | --DOMWINDOW == 98 (000000E252AB1000) [pid = 3252] [serial = 135] [outer = 0000000000000000] [url = http://web-platform.test:8000/XMLHttpRequest/formdata-set.htm]
23:37:03 INFO - PROCESS | 3252 | --DOMWINDOW == 97 (000000E261C8E000) [pid = 3252] [serial = 159] [outer = 0000000000000000] [url = http://web-platform.test:8000/XMLHttpRequest/getresponseheader-server-date.htm]
23:37:03 INFO - PROCESS | 3252 | --DOMWINDOW == 96 (000000E2610B4000) [pid = 3252] [serial = 150] [outer = 0000000000000000] [url = http://web-platform.test:8000/XMLHttpRequest/getresponseheader-chunked-trailer.htm]
23:37:03 INFO - PROCESS | 3252 | --DOMWINDOW == 95 (000000E25B390000) [pid = 3252] [serial = 132] [outer = 0000000000000000] [url = http://web-platform.test:8000/XMLHttpRequest/formdata-has.htm]
23:37:03 INFO - PROCESS | 3252 | --DOMWINDOW == 94 (000000E25AEEA800) [pid = 3252] [serial = 123] [outer = 0000000000000000] [url = http://web-platform.test:8000/XMLHttpRequest/formdata-delete.htm]
23:37:03 INFO - PROCESS | 3252 | --DOMWINDOW == 93 (000000E261B2B800) [pid = 3252] [serial = 156] [outer = 0000000000000000] [url = http://web-platform.test:8000/XMLHttpRequest/getresponseheader-error-state.htm]
23:37:03 INFO - PROCESS | 3252 | --DOMWINDOW == 92 (000000E259A30800) [pid = 3252] [serial = 138] [outer = 0000000000000000] [url = http://web-platform.test:8000/XMLHttpRequest/formdata.htm]
23:37:03 INFO - PROCESS | 3252 | --DOMWINDOW == 91 (000000E261525000) [pid = 3252] [serial = 153] [outer = 0000000000000000] [url = http://web-platform.test:8000/XMLHttpRequest/getresponseheader-cookies-and-more.htm]
23:37:03 INFO - PROCESS | 3252 | --DOMWINDOW == 90 (000000E25B62E000) [pid = 3252] [serial = 141] [outer = 0000000000000000] [url = http://web-platform.test:8000/XMLHttpRequest/getallresponseheaders-cookies.htm]
23:37:03 INFO - PROCESS | 3252 | --DOMWINDOW == 89 (000000E25AEDF000) [pid = 3252] [serial = 117] [outer = 0000000000000000] [url = http://web-platform.test:8000/XMLHttpRequest/event-upload-progress.htm]
23:37:03 INFO - PROCESS | 3252 | --DOMWINDOW == 88 (000000E2610AF000) [pid = 3252] [serial = 165] [outer = 0000000000000000] [url = http://web-platform.test:8000/XMLHttpRequest/getresponseheader-unsent-opened-state.htm]
23:37:03 INFO - PROCESS | 3252 | --DOMWINDOW == 87 (000000E260F20800) [pid = 3252] [serial = 162] [outer = 0000000000000000] [url = http://web-platform.test:8000/XMLHttpRequest/getresponseheader-special-characters.htm]
23:37:03 INFO - PROCESS | 3252 | --DOMWINDOW == 86 (000000E25F583800) [pid = 3252] [serial = 129] [outer = 0000000000000000] [url = http://web-platform.test:8000/XMLHttpRequest/formdata-get.htm]
23:37:03 INFO - PROCESS | 3252 | --DOMWINDOW == 85 (000000E25C222000) [pid = 3252] [serial = 126] [outer = 0000000000000000] [url = http://web-platform.test:8000/XMLHttpRequest/formdata-foreach.html]
23:37:03 INFO - PROCESS | 3252 | --DOMWINDOW == 84 (000000E253272000) [pid = 3252] [serial = 120] [outer = 0000000000000000] [url = http://web-platform.test:8000/XMLHttpRequest/formdata-blob.htm]
23:37:03 INFO - PROCESS | 3252 | --DOMWINDOW == 83 (000000E260E95000) [pid = 3252] [serial = 147] [outer = 0000000000000000] [url = http://web-platform.test:8000/XMLHttpRequest/getresponseheader-case-insensitive.htm]
23:37:03 INFO - PROCESS | 3252 | 1477636623070 Marionette TRACE conn5 -> [0,294,"getWindowHandles",null]
23:37:03 INFO - PROCESS | 3252 | 1477636623072 Marionette TRACE conn5 <- [1,294,null,["13"]]
23:37:03 INFO - PROCESS | 3252 | 1477636623075 Marionette TRACE conn5 -> [0,295,"switchToWindow",{"name":"13"}]
23:37:03 INFO - PROCESS | 3252 | 1477636623079 Marionette TRACE conn5 <- [1,295,null,{}]
23:37:03 INFO - PROCESS | 3252 | 1477636623082 Marionette TRACE conn5 -> [0,296,"executeAsyncScript",{"scriptTimeout":null,"sandbox":"default","debug_script":false,"script":"/* This Source Code Form is subject to the terms of the Mozilla Public\n * License, v. 2.0. If a copy of the MPL was not distributed with this\n * file, You can obtain one at http://mozilla.org/MPL/2.0/. */\n\nwindow.wrappedJSObject.timeout_multiplier = 3;\nwindow.wrappedJSObject.explicit_timeout = 0;\n\nwindow.wrappedJSObject.addEventListener(\"message\", function listener(event) {\n if (event.data.type != \"complete\") {\n return;\n }\n window.wrappedJSObject.removeEventListener(\"message\", listener);\n clearTimeout(timer);\n var tests = event.data.tests;\n var status = event.data.status;\n\n var subtest_results = tests.map(function(x) {\n return [x.name, x.status, x.message, x.stack]\n });\n\n marionetteScriptFinished([\"/XMLHttpRequest/open-open-sync-send.htm\",\n status.status,\n status.message,\n status.stack,\n subtest_results]);\n}, false);\n\nwindow.wrappedJSObject.win = window.open(\"http://web-platform.test:8000/XMLHttpRequest/open-open-sync-send.htm\", \"9298bc64-aba3-4cf2-8943-12823d317f6b\");\n\nvar timer = null;\nif (30000) {\n timer = setTimeout(function() {\n log(\"Timeout fired\");\n window.wrappedJSObject.win.timeout();\n }, 30000);\n}\n","newSandbox":false,"line":445,"args":[],"filename":"executormarionette.py"}]
23:37:03 INFO - PROCESS | 3252 | ++DOCSHELL 000000E24C1AD800 == 43 [pid = 3252] [id = 68]
23:37:03 INFO - PROCESS | 3252 | ++DOMWINDOW == 84 (000000E259A2E000) [pid = 3252] [serial = 201] [outer = 0000000000000000]
23:37:03 INFO - PROCESS | 3252 | ++DOMWINDOW == 85 (000000E25B385800) [pid = 3252] [serial = 202] [outer = 000000E259A2E000]
23:37:03 INFO - PROCESS | 3252 | 1477636623135 Marionette DEBUG loaded listener.js
23:37:03 INFO - PROCESS | 3252 | ++DOMWINDOW == 86 (000000E2610AF000) [pid = 3252] [serial = 203] [outer = 000000E259A2E000]
23:37:03 INFO - PROCESS | 3252 | 1477636623409 Marionette TRACE conn5 <- [1,296,null,{"value":["/XMLHttpRequest/open-open-sync-send.htm",0,null,null,[["XMLHttpRequest: open() - open() (sync) - send()",0,null,null]]]}]
23:37:03 INFO - .
23:37:03 INFO - TEST-OK | /XMLHttpRequest/open-open-sync-send.htm | took 881ms
23:37:03 INFO - TEST-START | /XMLHttpRequest/open-referer.htm
23:37:03 INFO - PROCESS | 3252 | 1477636623445 Marionette TRACE conn5 -> [0,297,"getWindowHandle",null]
23:37:03 INFO - PROCESS | 3252 | 1477636623447 Marionette TRACE conn5 <- [1,297,null,{"value":"13"}]
23:37:03 INFO - PROCESS | 3252 | 1477636623452 Marionette TRACE conn5 -> [0,298,"executeScript",{"scriptTimeout":null,"newSandbox":true,"args":[],"filename":"executormarionette.py","script":"if (window.wrappedJSObject.win) {window.wrappedJSObject.win.close()}","sandbox":"default","line":430}]
23:37:03 INFO - PROCESS | 3252 | 1477636623538 Marionette TRACE conn5 <- [1,298,null,{"value":null}]
23:37:03 INFO - PROCESS | 3252 | 1477636623543 Marionette TRACE conn5 -> [0,299,"getWindowHandles",null]
23:37:03 INFO - PROCESS | 3252 | 1477636623545 Marionette TRACE conn5 <- [1,299,null,["13"]]
23:37:03 INFO - PROCESS | 3252 | 1477636623607 Marionette TRACE conn5 -> [0,300,"switchToWindow",{"name":"13"}]
23:37:03 INFO - PROCESS | 3252 | 1477636623610 Marionette TRACE conn5 <- [1,300,null,{}]
23:37:03 INFO - PROCESS | 3252 | 1477636623616 Marionette TRACE conn5 -> [0,301,"executeAsyncScript",{"scriptTimeout":null,"sandbox":"default","debug_script":false,"script":"/* This Source Code Form is subject to the terms of the Mozilla Public\n * License, v. 2.0. If a copy of the MPL was not distributed with this\n * file, You can obtain one at http://mozilla.org/MPL/2.0/. */\n\nwindow.wrappedJSObject.timeout_multiplier = 3;\nwindow.wrappedJSObject.explicit_timeout = 0;\n\nwindow.wrappedJSObject.addEventListener(\"message\", function listener(event) {\n if (event.data.type != \"complete\") {\n return;\n }\n window.wrappedJSObject.removeEventListener(\"message\", listener);\n clearTimeout(timer);\n var tests = event.data.tests;\n var status = event.data.status;\n\n var subtest_results = tests.map(function(x) {\n return [x.name, x.status, x.message, x.stack]\n });\n\n marionetteScriptFinished([\"/XMLHttpRequest/open-referer.htm\",\n status.status,\n status.message,\n status.stack,\n subtest_results]);\n}, false);\n\nwindow.wrappedJSObject.win = window.open(\"http://web-platform.test:8000/XMLHttpRequest/open-referer.htm\", \"9298bc64-aba3-4cf2-8943-12823d317f6b\");\n\nvar timer = null;\nif (30000) {\n timer = setTimeout(function() {\n log(\"Timeout fired\");\n window.wrappedJSObject.win.timeout();\n }, 30000);\n}\n","newSandbox":false,"line":445,"args":[],"filename":"executormarionette.py"}]
23:37:03 INFO - PROCESS | 3252 | ++DOCSHELL 000000E261B29800 == 44 [pid = 3252] [id = 69]
23:37:03 INFO - PROCESS | 3252 | ++DOMWINDOW == 87 (000000E261B2A800) [pid = 3252] [serial = 204] [outer = 0000000000000000]
23:37:03 INFO - PROCESS | 3252 | ++DOMWINDOW == 88 (000000E261B31800) [pid = 3252] [serial = 205] [outer = 000000E261B2A800]
23:37:03 INFO - PROCESS | 3252 | 1477636623668 Marionette DEBUG loaded listener.js
23:37:03 INFO - PROCESS | 3252 | ++DOMWINDOW == 89 (000000E261C90000) [pid = 3252] [serial = 206] [outer = 000000E261B2A800]
23:37:03 INFO - PROCESS | 3252 | 1477636623937 Marionette TRACE conn5 <- [1,301,null,{"value":["/XMLHttpRequest/open-referer.htm",0,null,null,[["XMLHttpRequest: open() - value of Referer header",0,null,null]]]}]
23:37:03 INFO - .
23:37:03 INFO - TEST-OK | /XMLHttpRequest/open-referer.htm | took 523ms
23:37:03 INFO - PROCESS | 3252 | 1477636623976 Marionette TRACE conn5 -> [0,302,"getWindowHandle",null]
23:37:03 INFO - PROCESS | 3252 | 1477636623978 Marionette TRACE conn5 <- [1,302,null,{"value":"13"}]
23:37:03 INFO - TEST-START | /XMLHttpRequest/open-send-open.htm
23:37:03 INFO - PROCESS | 3252 | 1477636623983 Marionette TRACE conn5 -> [0,303,"executeScript",{"scriptTimeout":null,"newSandbox":true,"args":[],"filename":"executormarionette.py","script":"if (window.wrappedJSObject.win) {window.wrappedJSObject.win.close()}","sandbox":"default","line":430}]
23:37:04 INFO - PROCESS | 3252 | 1477636624096 Marionette TRACE conn5 <- [1,303,null,{"value":null}]
23:37:04 INFO - PROCESS | 3252 | 1477636624103 Marionette TRACE conn5 -> [0,304,"getWindowHandles",null]
23:37:04 INFO - PROCESS | 3252 | 1477636624106 Marionette TRACE conn5 <- [1,304,null,["13"]]
23:37:04 INFO - PROCESS | 3252 | 1477636624109 Marionette TRACE conn5 -> [0,305,"switchToWindow",{"name":"13"}]
23:37:04 INFO - PROCESS | 3252 | 1477636624112 Marionette TRACE conn5 <- [1,305,null,{}]
23:37:04 INFO - PROCESS | 3252 | 1477636624116 Marionette TRACE conn5 -> [0,306,"executeAsyncScript",{"scriptTimeout":null,"sandbox":"default","debug_script":false,"script":"/* This Source Code Form is subject to the terms of the Mozilla Public\n * License, v. 2.0. If a copy of the MPL was not distributed with this\n * file, You can obtain one at http://mozilla.org/MPL/2.0/. */\n\nwindow.wrappedJSObject.timeout_multiplier = 3;\nwindow.wrappedJSObject.explicit_timeout = 0;\n\nwindow.wrappedJSObject.addEventListener(\"message\", function listener(event) {\n if (event.data.type != \"complete\") {\n return;\n }\n window.wrappedJSObject.removeEventListener(\"message\", listener);\n clearTimeout(timer);\n var tests = event.data.tests;\n var status = event.data.status;\n\n var subtest_results = tests.map(function(x) {\n return [x.name, x.status, x.message, x.stack]\n });\n\n marionetteScriptFinished([\"/XMLHttpRequest/open-send-open.htm\",\n status.status,\n status.message,\n status.stack,\n subtest_results]);\n}, false);\n\nwindow.wrappedJSObject.win = window.open(\"http://web-platform.test:8000/XMLHttpRequest/open-send-open.htm\", \"9298bc64-aba3-4cf2-8943-12823d317f6b\");\n\nvar timer = null;\nif (30000) {\n timer = setTimeout(function() {\n log(\"Timeout fired\");\n window.wrappedJSObject.win.timeout();\n }, 30000);\n}\n","newSandbox":false,"line":445,"args":[],"filename":"executormarionette.py"}]
23:37:04 INFO - PROCESS | 3252 | ++DOCSHELL 000000E261C8B800 == 45 [pid = 3252] [id = 70]
23:37:04 INFO - PROCESS | 3252 | ++DOMWINDOW == 90 (000000E2633BB000) [pid = 3252] [serial = 207] [outer = 0000000000000000]
23:37:04 INFO - PROCESS | 3252 | ++DOMWINDOW == 91 (000000E2633BF000) [pid = 3252] [serial = 208] [outer = 000000E2633BB000]
23:37:04 INFO - PROCESS | 3252 | 1477636624170 Marionette DEBUG loaded listener.js
23:37:04 INFO - PROCESS | 3252 | ++DOMWINDOW == 92 (000000E2633C8800) [pid = 3252] [serial = 209] [outer = 000000E2633BB000]
23:37:04 INFO - PROCESS | 3252 | 1477636624515 Marionette TRACE conn5 <- [1,306,null,{"value":["/XMLHttpRequest/open-send-open.htm",0,null,null,[["XMLHttpRequest: open() - send() - open()",0,null,null]]]}]
23:37:04 INFO - .
23:37:04 INFO - TEST-OK | /XMLHttpRequest/open-send-open.htm | took 584ms
23:37:04 INFO - PROCESS | 3252 | 1477636624569 Marionette TRACE conn5 -> [0,307,"getWindowHandle",null]
23:37:04 INFO - PROCESS | 3252 | 1477636624572 Marionette TRACE conn5 <- [1,307,null,{"value":"13"}]
23:37:04 INFO - TEST-START | /XMLHttpRequest/open-sync-open-send.htm
23:37:04 INFO - PROCESS | 3252 | 1477636624576 Marionette TRACE conn5 -> [0,308,"executeScript",{"scriptTimeout":null,"newSandbox":true,"args":[],"filename":"executormarionette.py","script":"if (window.wrappedJSObject.win) {window.wrappedJSObject.win.close()}","sandbox":"default","line":430}]
23:37:04 INFO - PROCESS | 3252 | 1477636624709 Marionette TRACE conn5 <- [1,308,null,{"value":null}]
23:37:04 INFO - PROCESS | 3252 | 1477636624716 Marionette TRACE conn5 -> [0,309,"getWindowHandles",null]
23:37:04 INFO - PROCESS | 3252 | 1477636624718 Marionette TRACE conn5 <- [1,309,null,["13"]]
23:37:04 INFO - PROCESS | 3252 | 1477636624722 Marionette TRACE conn5 -> [0,310,"switchToWindow",{"name":"13"}]
23:37:04 INFO - PROCESS | 3252 | 1477636624726 Marionette TRACE conn5 <- [1,310,null,{}]
23:37:04 INFO - PROCESS | 3252 | 1477636624729 Marionette TRACE conn5 -> [0,311,"executeAsyncScript",{"scriptTimeout":null,"sandbox":"default","debug_script":false,"script":"/* This Source Code Form is subject to the terms of the Mozilla Public\n * License, v. 2.0. If a copy of the MPL was not distributed with this\n * file, You can obtain one at http://mozilla.org/MPL/2.0/. */\n\nwindow.wrappedJSObject.timeout_multiplier = 3;\nwindow.wrappedJSObject.explicit_timeout = 0;\n\nwindow.wrappedJSObject.addEventListener(\"message\", function listener(event) {\n if (event.data.type != \"complete\") {\n return;\n }\n window.wrappedJSObject.removeEventListener(\"message\", listener);\n clearTimeout(timer);\n var tests = event.data.tests;\n var status = event.data.status;\n\n var subtest_results = tests.map(function(x) {\n return [x.name, x.status, x.message, x.stack]\n });\n\n marionetteScriptFinished([\"/XMLHttpRequest/open-sync-open-send.htm\",\n status.status,\n status.message,\n status.stack,\n subtest_results]);\n}, false);\n\nwindow.wrappedJSObject.win = window.open(\"http://web-platform.test:8000/XMLHttpRequest/open-sync-open-send.htm\", \"9298bc64-aba3-4cf2-8943-12823d317f6b\");\n\nvar timer = null;\nif (30000) {\n timer = setTimeout(function() {\n log(\"Timeout fired\");\n window.wrappedJSObject.win.timeout();\n }, 30000);\n}\n","newSandbox":false,"line":445,"args":[],"filename":"executormarionette.py"}]
23:37:04 INFO - PROCESS | 3252 | ++DOCSHELL 000000E263518800 == 46 [pid = 3252] [id = 71]
23:37:04 INFO - PROCESS | 3252 | ++DOMWINDOW == 93 (000000E263519000) [pid = 3252] [serial = 210] [outer = 0000000000000000]
23:37:04 INFO - PROCESS | 3252 | ++DOMWINDOW == 94 (000000E26351D000) [pid = 3252] [serial = 211] [outer = 000000E263519000]
23:37:04 INFO - PROCESS | 3252 | 1477636624786 Marionette DEBUG loaded listener.js
23:37:04 INFO - PROCESS | 3252 | ++DOMWINDOW == 95 (000000E263324800) [pid = 3252] [serial = 212] [outer = 000000E263519000]
23:37:05 INFO - PROCESS | 3252 | 1477636625205 Marionette TRACE conn5 <- [1,311,null,{"value":["/XMLHttpRequest/open-sync-open-send.htm",0,null,null,[["XMLHttpRequest: open() (sync) - send() - open()",0,null,null]]]}]
23:37:05 INFO - .
23:37:05 INFO - TEST-OK | /XMLHttpRequest/open-sync-open-send.htm | took 671ms
23:37:05 INFO - PROCESS | 3252 | 1477636625250 Marionette TRACE conn5 -> [0,312,"getWindowHandle",null]
23:37:05 INFO - PROCESS | 3252 | 1477636625256 Marionette TRACE conn5 <- [1,312,null,{"value":"13"}]
23:37:05 INFO - TEST-START | /XMLHttpRequest/open-url-about-blank-window.htm
23:37:05 INFO - PROCESS | 3252 | 1477636625264 Marionette TRACE conn5 -> [0,313,"executeScript",{"scriptTimeout":null,"newSandbox":true,"args":[],"filename":"executormarionette.py","script":"if (window.wrappedJSObject.win) {window.wrappedJSObject.win.close()}","sandbox":"default","line":430}]
23:37:05 INFO - PROCESS | 3252 | 1477636625436 Marionette TRACE conn5 <- [1,313,null,{"value":null}]
23:37:05 INFO - PROCESS | 3252 | 1477636625545 Marionette TRACE conn5 -> [0,314,"getWindowHandles",null]
23:37:05 INFO - PROCESS | 3252 | 1477636625550 Marionette TRACE conn5 <- [1,314,null,["13"]]
23:37:05 INFO - PROCESS | 3252 | 1477636625558 Marionette TRACE conn5 -> [0,315,"switchToWindow",{"name":"13"}]
23:37:05 INFO - PROCESS | 3252 | 1477636625564 Marionette TRACE conn5 <- [1,315,null,{}]
23:37:05 INFO - PROCESS | 3252 | 1477636625569 Marionette TRACE conn5 -> [0,316,"executeAsyncScript",{"scriptTimeout":null,"sandbox":"default","debug_script":false,"script":"/* This Source Code Form is subject to the terms of the Mozilla Public\n * License, v. 2.0. If a copy of the MPL was not distributed with this\n * file, You can obtain one at http://mozilla.org/MPL/2.0/. */\n\nwindow.wrappedJSObject.timeout_multiplier = 3;\nwindow.wrappedJSObject.explicit_timeout = 0;\n\nwindow.wrappedJSObject.addEventListener(\"message\", function listener(event) {\n if (event.data.type != \"complete\") {\n return;\n }\n window.wrappedJSObject.removeEventListener(\"message\", listener);\n clearTimeout(timer);\n var tests = event.data.tests;\n var status = event.data.status;\n\n var subtest_results = tests.map(function(x) {\n return [x.name, x.status, x.message, x.stack]\n });\n\n marionetteScriptFinished([\"/XMLHttpRequest/open-url-about-blank-window.htm\",\n status.status,\n status.message,\n status.stack,\n subtest_results]);\n}, false);\n\nwindow.wrappedJSObject.win = window.open(\"http://web-platform.test:8000/XMLHttpRequest/open-url-about-blank-window.htm\", \"9298bc64-aba3-4cf2-8943-12823d317f6b\");\n\nvar timer = null;\nif (30000) {\n timer = setTimeout(function() {\n log(\"Timeout fired\");\n window.wrappedJSObject.win.timeout();\n }, 30000);\n}\n","newSandbox":false,"line":445,"args":[],"filename":"executormarionette.py"}]
23:37:05 INFO - PROCESS | 3252 | ++DOCSHELL 000000E25369B000 == 47 [pid = 3252] [id = 72]
23:37:05 INFO - PROCESS | 3252 | ++DOMWINDOW == 96 (000000E25369F800) [pid = 3252] [serial = 213] [outer = 0000000000000000]
23:37:05 INFO - PROCESS | 3252 | ++DOMWINDOW == 97 (000000E253713000) [pid = 3252] [serial = 214] [outer = 000000E25369F800]
23:37:05 INFO - PROCESS | 3252 | 1477636625642 Marionette DEBUG loaded listener.js
23:37:05 INFO - PROCESS | 3252 | ++DOMWINDOW == 98 (000000E257D2D000) [pid = 3252] [serial = 215] [outer = 000000E25369F800]
23:37:05 INFO - PROCESS | 3252 | ++DOCSHELL 000000E24D18F000 == 48 [pid = 3252] [id = 73]
23:37:05 INFO - PROCESS | 3252 | ++DOMWINDOW == 99 (000000E25A9CD800) [pid = 3252] [serial = 216] [outer = 0000000000000000]
23:37:05 INFO - PROCESS | 3252 | ++DOMWINDOW == 100 (000000E25A145000) [pid = 3252] [serial = 217] [outer = 000000E25A9CD800]
23:37:06 INFO - PROCESS | 3252 | 1477636626145 Marionette TRACE conn5 <- [1,316,null,{"value":["/XMLHttpRequest/open-url-about-blank-window.htm",0,null,null,[["XMLHttpRequest: open() resolving URLs (about:blank iframe)",0,null,null]]]}]
23:37:06 INFO - .
23:37:06 INFO - TEST-OK | /XMLHttpRequest/open-url-about-blank-window.htm | took 944ms
23:37:06 INFO - PROCESS | 3252 | 1477636626209 Marionette TRACE conn5 -> [0,317,"getWindowHandle",null]
23:37:06 INFO - PROCESS | 3252 | 1477636626213 Marionette TRACE conn5 <- [1,317,null,{"value":"13"}]
23:37:06 INFO - TEST-START | /XMLHttpRequest/open-url-base-inserted-after-open.htm
23:37:06 INFO - PROCESS | 3252 | 1477636626218 Marionette TRACE conn5 -> [0,318,"executeScript",{"scriptTimeout":null,"newSandbox":true,"args":[],"filename":"executormarionette.py","script":"if (window.wrappedJSObject.win) {window.wrappedJSObject.win.close()}","sandbox":"default","line":430}]
23:37:06 INFO - PROCESS | 3252 | 1477636626391 Marionette TRACE conn5 <- [1,318,null,{"value":null}]
23:37:06 INFO - PROCESS | 3252 | 1477636626501 Marionette TRACE conn5 -> [0,319,"getWindowHandles",null]
23:37:06 INFO - PROCESS | 3252 | 1477636626504 Marionette TRACE conn5 <- [1,319,null,["13"]]
23:37:06 INFO - PROCESS | 3252 | 1477636626511 Marionette TRACE conn5 -> [0,320,"switchToWindow",{"name":"13"}]
23:37:06 INFO - PROCESS | 3252 | 1477636626516 Marionette TRACE conn5 <- [1,320,null,{}]
23:37:06 INFO - PROCESS | 3252 | 1477636626520 Marionette TRACE conn5 -> [0,321,"executeAsyncScript",{"scriptTimeout":null,"sandbox":"default","debug_script":false,"script":"/* This Source Code Form is subject to the terms of the Mozilla Public\n * License, v. 2.0. If a copy of the MPL was not distributed with this\n * file, You can obtain one at http://mozilla.org/MPL/2.0/. */\n\nwindow.wrappedJSObject.timeout_multiplier = 3;\nwindow.wrappedJSObject.explicit_timeout = 0;\n\nwindow.wrappedJSObject.addEventListener(\"message\", function listener(event) {\n if (event.data.type != \"complete\") {\n return;\n }\n window.wrappedJSObject.removeEventListener(\"message\", listener);\n clearTimeout(timer);\n var tests = event.data.tests;\n var status = event.data.status;\n\n var subtest_results = tests.map(function(x) {\n return [x.name, x.status, x.message, x.stack]\n });\n\n marionetteScriptFinished([\"/XMLHttpRequest/open-url-base-inserted-after-open.htm\",\n status.status,\n status.message,\n status.stack,\n subtest_results]);\n}, false);\n\nwindow.wrappedJSObject.win = window.open(\"http://web-platform.test:8000/XMLHttpRequest/open-url-base-inserted-after-open.htm\", \"9298bc64-aba3-4cf2-8943-12823d317f6b\");\n\nvar timer = null;\nif (30000) {\n timer = setTimeout(function() {\n log(\"Timeout fired\");\n window.wrappedJSObject.win.timeout();\n }, 30000);\n}\n","newSandbox":false,"line":445,"args":[],"filename":"executormarionette.py"}]
23:37:06 INFO - PROCESS | 3252 | ++DOCSHELL 000000E25BA20000 == 49 [pid = 3252] [id = 74]
23:37:06 INFO - PROCESS | 3252 | ++DOMWINDOW == 101 (000000E25BA20800) [pid = 3252] [serial = 218] [outer = 0000000000000000]
23:37:06 INFO - PROCESS | 3252 | ++DOMWINDOW == 102 (000000E25BF6A800) [pid = 3252] [serial = 219] [outer = 000000E25BA20800]
23:37:06 INFO - PROCESS | 3252 | 1477636626588 Marionette DEBUG loaded listener.js
23:37:06 INFO - PROCESS | 3252 | ++DOMWINDOW == 103 (000000E25F599800) [pid = 3252] [serial = 220] [outer = 000000E25BA20800]
23:37:07 INFO - PROCESS | 3252 | 1477636627004 Marionette TRACE conn5 <- [1,321,null,{"value":["/XMLHttpRequest/open-url-base-inserted-after-open.htm",0,null,null,[["XMLHttpRequest: open() resolving URLs - insert after open()",0,null,null]]]}]
23:37:07 INFO - .
23:37:07 INFO - TEST-OK | /XMLHttpRequest/open-url-base-inserted-after-open.htm | took 817ms
23:37:07 INFO - PROCESS | 3252 | 1477636627046 Marionette TRACE conn5 -> [0,322,"getWindowHandle",null]
23:37:07 INFO - PROCESS | 3252 | 1477636627051 Marionette TRACE conn5 <- [1,322,null,{"value":"13"}]
23:37:07 INFO - TEST-START | /XMLHttpRequest/open-url-base-inserted.htm
23:37:07 INFO - PROCESS | 3252 | 1477636627056 Marionette TRACE conn5 -> [0,323,"executeScript",{"scriptTimeout":null,"newSandbox":true,"args":[],"filename":"executormarionette.py","script":"if (window.wrappedJSObject.win) {window.wrappedJSObject.win.close()}","sandbox":"default","line":430}]
23:37:07 INFO - PROCESS | 3252 | 1477636627205 Marionette TRACE conn5 <- [1,323,null,{"value":null}]
23:37:07 INFO - PROCESS | 3252 | 1477636627274 Marionette TRACE conn5 -> [0,324,"getWindowHandles",null]
23:37:07 INFO - PROCESS | 3252 | 1477636627278 Marionette TRACE conn5 <- [1,324,null,["13"]]
23:37:07 INFO - PROCESS | 3252 | 1477636627325 Marionette TRACE conn5 -> [0,325,"switchToWindow",{"name":"13"}]
23:37:07 INFO - PROCESS | 3252 | 1477636627331 Marionette TRACE conn5 <- [1,325,null,{}]
23:37:07 INFO - PROCESS | 3252 | 1477636627335 Marionette TRACE conn5 -> [0,326,"executeAsyncScript",{"scriptTimeout":null,"sandbox":"default","debug_script":false,"script":"/* This Source Code Form is subject to the terms of the Mozilla Public\n * License, v. 2.0. If a copy of the MPL was not distributed with this\n * file, You can obtain one at http://mozilla.org/MPL/2.0/. */\n\nwindow.wrappedJSObject.timeout_multiplier = 3;\nwindow.wrappedJSObject.explicit_timeout = 0;\n\nwindow.wrappedJSObject.addEventListener(\"message\", function listener(event) {\n if (event.data.type != \"complete\") {\n return;\n }\n window.wrappedJSObject.removeEventListener(\"message\", listener);\n clearTimeout(timer);\n var tests = event.data.tests;\n var status = event.data.status;\n\n var subtest_results = tests.map(function(x) {\n return [x.name, x.status, x.message, x.stack]\n });\n\n marionetteScriptFinished([\"/XMLHttpRequest/open-url-base-inserted.htm\",\n status.status,\n status.message,\n status.stack,\n subtest_results]);\n}, false);\n\nwindow.wrappedJSObject.win = window.open(\"http://web-platform.test:8000/XMLHttpRequest/open-url-base-inserted.htm\", \"9298bc64-aba3-4cf2-8943-12823d317f6b\");\n\nvar timer = null;\nif (30000) {\n timer = setTimeout(function() {\n log(\"Timeout fired\");\n window.wrappedJSObject.win.timeout();\n }, 30000);\n}\n","newSandbox":false,"line":445,"args":[],"filename":"executormarionette.py"}]
23:37:07 INFO - PROCESS | 3252 | ++DOCSHELL 000000E263326000 == 50 [pid = 3252] [id = 75]
23:37:07 INFO - PROCESS | 3252 | ++DOMWINDOW == 104 (000000E263327000) [pid = 3252] [serial = 221] [outer = 0000000000000000]
23:37:07 INFO - PROCESS | 3252 | ++DOMWINDOW == 105 (000000E26332D800) [pid = 3252] [serial = 222] [outer = 000000E263327000]
23:37:07 INFO - PROCESS | 3252 | 1477636627404 Marionette DEBUG loaded listener.js
23:37:07 INFO - PROCESS | 3252 | ++DOMWINDOW == 106 (000000E263338800) [pid = 3252] [serial = 223] [outer = 000000E263327000]
23:37:07 INFO - PROCESS | 3252 | 1477636627804 Marionette TRACE conn5 <- [1,326,null,{"value":["/XMLHttpRequest/open-url-base-inserted.htm",0,null,null,[["XMLHttpRequest: open() resolving URLs - insert ",0,null,null]]]}]
23:37:07 INFO - .
23:37:07 INFO - TEST-OK | /XMLHttpRequest/open-url-base-inserted.htm | took 776ms
23:37:07 INFO - PROCESS | 3252 | 1477636627834 Marionette TRACE conn5 -> [0,327,"getWindowHandle",null]
23:37:07 INFO - PROCESS | 3252 | 1477636627838 Marionette TRACE conn5 <- [1,327,null,{"value":"13"}]
23:37:07 INFO - TEST-START | /XMLHttpRequest/open-url-base.htm
23:37:07 INFO - PROCESS | 3252 | 1477636627843 Marionette TRACE conn5 -> [0,328,"executeScript",{"scriptTimeout":null,"newSandbox":true,"args":[],"filename":"executormarionette.py","script":"if (window.wrappedJSObject.win) {window.wrappedJSObject.win.close()}","sandbox":"default","line":430}]
23:37:07 INFO - PROCESS | 3252 | 1477636627961 Marionette TRACE conn5 <- [1,328,null,{"value":null}]
23:37:08 INFO - PROCESS | 3252 | 1477636628029 Marionette TRACE conn5 -> [0,329,"getWindowHandles",null]
23:37:08 INFO - PROCESS | 3252 | 1477636628032 Marionette TRACE conn5 <- [1,329,null,["13"]]
23:37:08 INFO - PROCESS | 3252 | 1477636628036 Marionette TRACE conn5 -> [0,330,"switchToWindow",{"name":"13"}]
23:37:08 INFO - PROCESS | 3252 | 1477636628041 Marionette TRACE conn5 <- [1,330,null,{}]
23:37:08 INFO - PROCESS | 3252 | 1477636628058 Marionette TRACE conn5 -> [0,331,"executeAsyncScript",{"scriptTimeout":null,"sandbox":"default","debug_script":false,"script":"/* This Source Code Form is subject to the terms of the Mozilla Public\n * License, v. 2.0. If a copy of the MPL was not distributed with this\n * file, You can obtain one at http://mozilla.org/MPL/2.0/. */\n\nwindow.wrappedJSObject.timeout_multiplier = 3;\nwindow.wrappedJSObject.explicit_timeout = 0;\n\nwindow.wrappedJSObject.addEventListener(\"message\", function listener(event) {\n if (event.data.type != \"complete\") {\n return;\n }\n window.wrappedJSObject.removeEventListener(\"message\", listener);\n clearTimeout(timer);\n var tests = event.data.tests;\n var status = event.data.status;\n\n var subtest_results = tests.map(function(x) {\n return [x.name, x.status, x.message, x.stack]\n });\n\n marionetteScriptFinished([\"/XMLHttpRequest/open-url-base.htm\",\n status.status,\n status.message,\n status.stack,\n subtest_results]);\n}, false);\n\nwindow.wrappedJSObject.win = window.open(\"http://web-platform.test:8000/XMLHttpRequest/open-url-base.htm\", \"9298bc64-aba3-4cf2-8943-12823d317f6b\");\n\nvar timer = null;\nif (30000) {\n timer = setTimeout(function() {\n log(\"Timeout fired\");\n window.wrappedJSObject.win.timeout();\n }, 30000);\n}\n","newSandbox":false,"line":445,"args":[],"filename":"executormarionette.py"}]
23:37:08 INFO - PROCESS | 3252 | ++DOCSHELL 000000E24DF5A000 == 51 [pid = 3252] [id = 76]
23:37:08 INFO - PROCESS | 3252 | ++DOMWINDOW == 107 (000000E24DF5A800) [pid = 3252] [serial = 224] [outer = 0000000000000000]
23:37:08 INFO - PROCESS | 3252 | ++DOMWINDOW == 108 (000000E24DF5E800) [pid = 3252] [serial = 225] [outer = 000000E24DF5A800]
23:37:08 INFO - PROCESS | 3252 | 1477636628125 Marionette DEBUG loaded listener.js
23:37:08 INFO - PROCESS | 3252 | ++DOMWINDOW == 109 (000000E24DF67800) [pid = 3252] [serial = 226] [outer = 000000E24DF5A800]
23:37:08 INFO - PROCESS | 3252 | 1477636628555 Marionette TRACE conn5 <- [1,331,null,{"value":["/XMLHttpRequest/open-url-base.htm",0,null,null,[["XMLHttpRequest: open() resolving URLs - ",0,null,null]]]}]
23:37:08 INFO - .
23:37:08 INFO - TEST-OK | /XMLHttpRequest/open-url-base.htm | took 734ms
23:37:08 INFO - PROCESS | 3252 | 1477636628578 Marionette TRACE conn5 -> [0,332,"getWindowHandle",null]
23:37:08 INFO - PROCESS | 3252 | 1477636628580 Marionette TRACE conn5 <- [1,332,null,{"value":"13"}]
23:37:08 INFO - TEST-START | /XMLHttpRequest/open-url-bogus.htm
23:37:08 INFO - PROCESS | 3252 | 1477636628585 Marionette TRACE conn5 -> [0,333,"executeScript",{"scriptTimeout":null,"newSandbox":true,"args":[],"filename":"executormarionette.py","script":"if (window.wrappedJSObject.win) {window.wrappedJSObject.win.close()}","sandbox":"default","line":430}]
23:37:08 INFO - PROCESS | 3252 | 1477636628701 Marionette TRACE conn5 <- [1,333,null,{"value":null}]
23:37:08 INFO - PROCESS | 3252 | 1477636628770 Marionette TRACE conn5 -> [0,334,"getWindowHandles",null]
23:37:08 INFO - PROCESS | 3252 | 1477636628773 Marionette TRACE conn5 <- [1,334,null,["13"]]
23:37:08 INFO - PROCESS | 3252 | 1477636628777 Marionette TRACE conn5 -> [0,335,"switchToWindow",{"name":"13"}]
23:37:08 INFO - PROCESS | 3252 | 1477636628781 Marionette TRACE conn5 <- [1,335,null,{}]
23:37:08 INFO - PROCESS | 3252 | 1477636628936 Marionette TRACE conn5 -> [0,336,"executeAsyncScript",{"scriptTimeout":null,"sandbox":"default","debug_script":false,"script":"/* This Source Code Form is subject to the terms of the Mozilla Public\n * License, v. 2.0. If a copy of the MPL was not distributed with this\n * file, You can obtain one at http://mozilla.org/MPL/2.0/. */\n\nwindow.wrappedJSObject.timeout_multiplier = 3;\nwindow.wrappedJSObject.explicit_timeout = 0;\n\nwindow.wrappedJSObject.addEventListener(\"message\", function listener(event) {\n if (event.data.type != \"complete\") {\n return;\n }\n window.wrappedJSObject.removeEventListener(\"message\", listener);\n clearTimeout(timer);\n var tests = event.data.tests;\n var status = event.data.status;\n\n var subtest_results = tests.map(function(x) {\n return [x.name, x.status, x.message, x.stack]\n });\n\n marionetteScriptFinished([\"/XMLHttpRequest/open-url-bogus.htm\",\n status.status,\n status.message,\n status.stack,\n subtest_results]);\n}, false);\n\nwindow.wrappedJSObject.win = window.open(\"http://web-platform.test:8000/XMLHttpRequest/open-url-bogus.htm\", \"9298bc64-aba3-4cf2-8943-12823d317f6b\");\n\nvar timer = null;\nif (30000) {\n timer = setTimeout(function() {\n log(\"Timeout fired\");\n window.wrappedJSObject.win.timeout();\n }, 30000);\n}\n","newSandbox":false,"line":445,"args":[],"filename":"executormarionette.py"}]
23:37:08 INFO - PROCESS | 3252 | ++DOCSHELL 000000E24E61B000 == 52 [pid = 3252] [id = 77]
23:37:08 INFO - PROCESS | 3252 | ++DOMWINDOW == 110 (000000E24E949800) [pid = 3252] [serial = 227] [outer = 0000000000000000]
23:37:09 INFO - PROCESS | 3252 | ++DOMWINDOW == 111 (000000E253421000) [pid = 3252] [serial = 228] [outer = 000000E24E949800]
23:37:09 INFO - PROCESS | 3252 | 1477636629001 Marionette DEBUG loaded listener.js
23:37:09 INFO - PROCESS | 3252 | ++DOMWINDOW == 112 (000000E257D26000) [pid = 3252] [serial = 229] [outer = 000000E24E949800]
23:37:09 INFO - PROCESS | 3252 | [3252] WARNING: NS_ENSURE_SUCCESS(rv, rv) failed with result 0x804B000A: file c:/builds/moz2_slave/fx-team-w64-d-0000000000000000/build/src/netwerk/base/nsIOService.cpp, line 778
23:37:09 INFO - PROCESS | 3252 | [3252] WARNING: NS_ENSURE_SUCCESS(rv, rv) failed with result 0x804B000A: file c:\builds\moz2_slave\fx-team-w64-d-0000000000000000\build\src\netwerk\base\nsNetUtilInlines.h, line 180
23:37:09 INFO - PROCESS | 3252 | [3252] WARNING: NS_ENSURE_SUCCESS(rv, rv) failed with result 0x804B000A: file c:/builds/moz2_slave/fx-team-w64-d-0000000000000000/build/src/dom/xhr/XMLHttpRequestMainThread.cpp, line 2495
23:37:09 INFO - PROCESS | 3252 | 1477636629477 Marionette TRACE conn5 <- [1,336,null,{"value":["/XMLHttpRequest/open-url-bogus.htm",0,null,null,[["XMLHttpRequest: open() - bogus URLs (//[)",0,null,null],["XMLHttpRequest: open() - bogus URLs (ftp:)",1,"assert_throws: function \"function () { client.open(\"GET\", url) }\" did not throw","url/<@http://web-platform.test:8000/XMLHttpRequest/open-url-bogus.htm:15:11\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\ntest@http://web-platform.test:8000/resources/testharness.js:501:9\nurl@http://web-platform.test:8000/XMLHttpRequest/open-url-bogus.htm:13:9\n@http://web-platform.test:8000/XMLHttpRequest/open-url-bogus.htm:19:7\n"],["XMLHttpRequest: open() - bogus URLs (http://a a/)",0,null,null],["XMLHttpRequest: open() - bogus URLs (http:////////////)",1,"assert_throws: function \"function () { client.open(\"GET\", url) }\" did not throw","url/<@http://web-platform.test:8000/XMLHttpRequest/open-url-bogus.htm:15:11\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\ntest@http://web-platform.test:8000/resources/testharness.js:501:9\nurl@http://web-platform.test:8000/XMLHttpRequest/open-url-bogus.htm:13:9\n@http://web-platform.test:8000/XMLHttpRequest/open-url-bogus.htm:21:7\n"],["XMLHttpRequest: open() - bogus URLs (http://u:p@/)",0,null,null]]]}]
23:37:09 INFO - .....
23:37:09 INFO - TEST-OK | /XMLHttpRequest/open-url-bogus.htm | took 924ms
23:37:09 INFO - PROCESS | 3252 | 1477636629513 Marionette TRACE conn5 -> [0,337,"getWindowHandle",null]
23:37:09 INFO - PROCESS | 3252 | 1477636629517 Marionette TRACE conn5 <- [1,337,null,{"value":"13"}]
23:37:09 INFO - TEST-START | /XMLHttpRequest/open-url-encoding.htm
23:37:09 INFO - PROCESS | 3252 | 1477636629527 Marionette TRACE conn5 -> [0,338,"executeScript",{"scriptTimeout":null,"newSandbox":true,"args":[],"filename":"executormarionette.py","script":"if (window.wrappedJSObject.win) {window.wrappedJSObject.win.close()}","sandbox":"default","line":430}]
23:37:09 INFO - PROCESS | 3252 | 1477636629682 Marionette TRACE conn5 <- [1,338,null,{"value":null}]
23:37:09 INFO - PROCESS | 3252 | 1477636629753 Marionette TRACE conn5 -> [0,339,"getWindowHandles",null]
23:37:09 INFO - PROCESS | 3252 | 1477636629756 Marionette TRACE conn5 <- [1,339,null,["13"]]
23:37:09 INFO - PROCESS | 3252 | 1477636629811 Marionette TRACE conn5 -> [0,340,"switchToWindow",{"name":"13"}]
23:37:09 INFO - PROCESS | 3252 | 1477636629816 Marionette TRACE conn5 <- [1,340,null,{}]
23:37:09 INFO - PROCESS | 3252 | 1477636629825 Marionette TRACE conn5 -> [0,341,"executeAsyncScript",{"scriptTimeout":null,"sandbox":"default","debug_script":false,"script":"/* This Source Code Form is subject to the terms of the Mozilla Public\n * License, v. 2.0. If a copy of the MPL was not distributed with this\n * file, You can obtain one at http://mozilla.org/MPL/2.0/. */\n\nwindow.wrappedJSObject.timeout_multiplier = 3;\nwindow.wrappedJSObject.explicit_timeout = 0;\n\nwindow.wrappedJSObject.addEventListener(\"message\", function listener(event) {\n if (event.data.type != \"complete\") {\n return;\n }\n window.wrappedJSObject.removeEventListener(\"message\", listener);\n clearTimeout(timer);\n var tests = event.data.tests;\n var status = event.data.status;\n\n var subtest_results = tests.map(function(x) {\n return [x.name, x.status, x.message, x.stack]\n });\n\n marionetteScriptFinished([\"/XMLHttpRequest/open-url-encoding.htm\",\n status.status,\n status.message,\n status.stack,\n subtest_results]);\n}, false);\n\nwindow.wrappedJSObject.win = window.open(\"http://web-platform.test:8000/XMLHttpRequest/open-url-encoding.htm\", \"9298bc64-aba3-4cf2-8943-12823d317f6b\");\n\nvar timer = null;\nif (30000) {\n timer = setTimeout(function() {\n log(\"Timeout fired\");\n window.wrappedJSObject.win.timeout();\n }, 30000);\n}\n","newSandbox":false,"line":445,"args":[],"filename":"executormarionette.py"}]
23:37:09 INFO - PROCESS | 3252 | ++DOCSHELL 000000E2534B0000 == 53 [pid = 3252] [id = 78]
23:37:09 INFO - PROCESS | 3252 | ++DOMWINDOW == 113 (000000E25369B800) [pid = 3252] [serial = 230] [outer = 0000000000000000]
23:37:09 INFO - PROCESS | 3252 | ++DOMWINDOW == 114 (000000E25450C800) [pid = 3252] [serial = 231] [outer = 000000E25369B800]
23:37:09 INFO - PROCESS | 3252 | 1477636629885 Marionette DEBUG loaded listener.js
23:37:09 INFO - PROCESS | 3252 | ++DOMWINDOW == 115 (000000E257D2B800) [pid = 3252] [serial = 232] [outer = 000000E25369B800]
23:37:10 INFO - PROCESS | 3252 | --DOCSHELL 000000E261C8B800 == 52 [pid = 3252] [id = 70]
23:37:10 INFO - PROCESS | 3252 | --DOCSHELL 000000E261B29800 == 51 [pid = 3252] [id = 69]
23:37:10 INFO - PROCESS | 3252 | --DOCSHELL 000000E24C1AD800 == 50 [pid = 3252] [id = 68]
23:37:10 INFO - PROCESS | 3252 | --DOCSHELL 000000E260F18000 == 49 [pid = 3252] [id = 67]
23:37:10 INFO - PROCESS | 3252 | --DOCSHELL 000000E260276000 == 48 [pid = 3252] [id = 66]
23:37:10 INFO - PROCESS | 3252 | --DOCSHELL 000000E25B848000 == 47 [pid = 3252] [id = 65]
23:37:10 INFO - PROCESS | 3252 | --DOCSHELL 000000E25B13E800 == 46 [pid = 3252] [id = 64]
23:37:10 INFO - PROCESS | 3252 | --DOCSHELL 000000E24DEDB800 == 45 [pid = 3252] [id = 63]
23:37:10 INFO - PROCESS | 3252 | --DOCSHELL 000000E25305D000 == 44 [pid = 3252] [id = 62]
23:37:10 INFO - PROCESS | 3252 | --DOCSHELL 000000E24DECE800 == 43 [pid = 3252] [id = 61]
23:37:10 INFO - PROCESS | 3252 | --DOCSHELL 000000E257D31000 == 42 [pid = 3252] [id = 58]
23:37:10 INFO - PROCESS | 3252 | --DOCSHELL 000000E260F2A800 == 41 [pid = 3252] [id = 59]
23:37:10 INFO - PROCESS | 3252 | --DOCSHELL 000000E25326A800 == 40 [pid = 3252] [id = 41]
23:37:10 INFO - PROCESS | 3252 | --DOCSHELL 000000E25F583000 == 39 [pid = 3252] [id = 44]
23:37:10 INFO - PROCESS | 3252 | --DOCSHELL 000000E25AED8000 == 38 [pid = 3252] [id = 45]
23:37:10 INFO - PROCESS | 3252 | --DOCSHELL 000000E25C21B800 == 37 [pid = 3252] [id = 43]
23:37:10 INFO - PROCESS | 3252 | --DOCSHELL 000000E25B323800 == 36 [pid = 3252] [id = 57]
23:37:10 INFO - PROCESS | 3252 | --DOCSHELL 000000E25AEE8800 == 35 [pid = 3252] [id = 42]
23:37:10 INFO - PROCESS | 3252 | --DOCSHELL 000000E25A13A800 == 34 [pid = 3252] [id = 60]
23:37:10 INFO - PROCESS | 3252 | --DOCSHELL 000000E24E61B000 == 33 [pid = 3252] [id = 77]
23:37:10 INFO - PROCESS | 3252 | --DOCSHELL 000000E263326000 == 32 [pid = 3252] [id = 75]
23:37:10 INFO - PROCESS | 3252 | --DOCSHELL 000000E24DF5A000 == 31 [pid = 3252] [id = 76]
23:37:10 INFO - PROCESS | 3252 | --DOCSHELL 000000E263518800 == 30 [pid = 3252] [id = 71]
23:37:10 INFO - PROCESS | 3252 | --DOCSHELL 000000E24D18F000 == 29 [pid = 3252] [id = 73]
23:37:10 INFO - PROCESS | 3252 | --DOCSHELL 000000E25369B000 == 28 [pid = 3252] [id = 72]
23:37:10 INFO - PROCESS | 3252 | --DOCSHELL 000000E25BA20000 == 27 [pid = 3252] [id = 74]
23:37:10 INFO - PROCESS | 3252 | --DOMWINDOW == 114 (000000E2614BF800) [pid = 3252] [serial = 166] [outer = 0000000000000000] [url = about:blank]
23:37:10 INFO - PROCESS | 3252 | --DOMWINDOW == 113 (000000E25AF86000) [pid = 3252] [serial = 119] [outer = 0000000000000000] [url = about:blank]
23:37:10 INFO - PROCESS | 3252 | --DOMWINDOW == 112 (000000E25451F800) [pid = 3252] [serial = 122] [outer = 0000000000000000] [url = about:blank]
23:37:10 INFO - PROCESS | 3252 | --DOMWINDOW == 111 (000000E254315000) [pid = 3252] [serial = 121] [outer = 0000000000000000] [url = about:blank]
23:37:10 INFO - PROCESS | 3252 | --DOMWINDOW == 110 (000000E25B62F000) [pid = 3252] [serial = 125] [outer = 0000000000000000] [url = about:blank]
23:37:10 INFO - PROCESS | 3252 | --DOMWINDOW == 109 (000000E25B14D000) [pid = 3252] [serial = 124] [outer = 0000000000000000] [url = about:blank]
23:37:10 INFO - PROCESS | 3252 | --DOMWINDOW == 108 (000000E25DE0A000) [pid = 3252] [serial = 128] [outer = 0000000000000000] [url = about:blank]
23:37:10 INFO - PROCESS | 3252 | --DOMWINDOW == 107 (000000E25D872000) [pid = 3252] [serial = 127] [outer = 0000000000000000] [url = about:blank]
23:37:10 INFO - PROCESS | 3252 | --DOMWINDOW == 106 (000000E260266800) [pid = 3252] [serial = 131] [outer = 0000000000000000] [url = about:blank]
23:37:10 INFO - PROCESS | 3252 | --DOMWINDOW == 105 (000000E25F58E800) [pid = 3252] [serial = 130] [outer = 0000000000000000] [url = about:blank]
23:37:10 INFO - PROCESS | 3252 | --DOMWINDOW == 104 (000000E260E9F000) [pid = 3252] [serial = 134] [outer = 0000000000000000] [url = about:blank]
23:37:10 INFO - PROCESS | 3252 | --DOMWINDOW == 103 (000000E2604C6800) [pid = 3252] [serial = 133] [outer = 0000000000000000] [url = about:blank]
23:37:10 INFO - PROCESS | 3252 | --DOMWINDOW == 102 (000000E254516000) [pid = 3252] [serial = 137] [outer = 0000000000000000] [url = about:blank]
23:37:10 INFO - PROCESS | 3252 | --DOMWINDOW == 101 (000000E2534AB000) [pid = 3252] [serial = 136] [outer = 0000000000000000] [url = about:blank]
23:37:10 INFO - PROCESS | 3252 | --DOMWINDOW == 100 (000000E25A9CF000) [pid = 3252] [serial = 140] [outer = 0000000000000000] [url = about:blank]
23:37:10 INFO - PROCESS | 3252 | --DOMWINDOW == 99 (000000E259E28800) [pid = 3252] [serial = 139] [outer = 0000000000000000] [url = about:blank]
23:37:10 INFO - PROCESS | 3252 | --DOMWINDOW == 98 (000000E25C009000) [pid = 3252] [serial = 143] [outer = 0000000000000000] [url = about:blank]
23:37:10 INFO - PROCESS | 3252 | --DOMWINDOW == 97 (000000E25BB8F800) [pid = 3252] [serial = 142] [outer = 0000000000000000] [url = about:blank]
23:37:10 INFO - PROCESS | 3252 | --DOMWINDOW == 96 (000000E2604C2000) [pid = 3252] [serial = 146] [outer = 0000000000000000] [url = about:blank]
23:37:10 INFO - PROCESS | 3252 | --DOMWINDOW == 95 (000000E25F597800) [pid = 3252] [serial = 145] [outer = 0000000000000000] [url = about:blank]
23:37:10 INFO - PROCESS | 3252 | --DOMWINDOW == 94 (000000E260F16000) [pid = 3252] [serial = 149] [outer = 0000000000000000] [url = about:blank]
23:37:10 INFO - PROCESS | 3252 | --DOMWINDOW == 93 (000000E260E9A800) [pid = 3252] [serial = 148] [outer = 0000000000000000] [url = about:blank]
23:37:10 INFO - PROCESS | 3252 | --DOMWINDOW == 92 (000000E2610C7000) [pid = 3252] [serial = 152] [outer = 0000000000000000] [url = about:blank]
23:37:10 INFO - PROCESS | 3252 | --DOMWINDOW == 91 (000000E2610BA000) [pid = 3252] [serial = 151] [outer = 0000000000000000] [url = about:blank]
23:37:10 INFO - PROCESS | 3252 | --DOMWINDOW == 90 (000000E261B17000) [pid = 3252] [serial = 155] [outer = 0000000000000000] [url = about:blank]
23:37:10 INFO - PROCESS | 3252 | --DOMWINDOW == 89 (000000E26152C800) [pid = 3252] [serial = 154] [outer = 0000000000000000] [url = about:blank]
23:37:10 INFO - PROCESS | 3252 | --DOMWINDOW == 88 (000000E261C78800) [pid = 3252] [serial = 158] [outer = 0000000000000000] [url = about:blank]
23:37:10 INFO - PROCESS | 3252 | --DOMWINDOW == 87 (000000E261B2F800) [pid = 3252] [serial = 157] [outer = 0000000000000000] [url = about:blank]
23:37:10 INFO - PROCESS | 3252 | --DOMWINDOW == 86 (000000E25BA0F800) [pid = 3252] [serial = 161] [outer = 0000000000000000] [url = about:blank]
23:37:10 INFO - PROCESS | 3252 | --DOMWINDOW == 85 (000000E25BA05800) [pid = 3252] [serial = 160] [outer = 0000000000000000] [url = about:blank]
23:37:10 INFO - PROCESS | 3252 | --DOMWINDOW == 84 (000000E257D1D000) [pid = 3252] [serial = 164] [outer = 0000000000000000] [url = about:blank]
23:37:10 INFO - PROCESS | 3252 | --DOMWINDOW == 83 (000000E257D14800) [pid = 3252] [serial = 163] [outer = 0000000000000000] [url = about:blank]
23:37:10 INFO - PROCESS | 3252 | --DOMWINDOW == 82 (000000E2614CF800) [pid = 3252] [serial = 167] [outer = 0000000000000000] [url = about:blank]
23:37:10 INFO - PROCESS | 3252 | --DOMWINDOW == 81 (000000E25B328000) [pid = 3252] [serial = 169] [outer = 0000000000000000] [url = about:blank]
23:37:10 INFO - PROCESS | 3252 | [3252] WARNING: String ending in half a surrogate pair!: file c:\builds\moz2_slave\fx-team-w64-d-0000000000000000\build\src\xpcom\string\nsUTF8Utils.h, line 594
23:37:10 INFO - PROCESS | 3252 | [3252] WARNING: String ending in half a surrogate pair!: file c:\builds\moz2_slave\fx-team-w64-d-0000000000000000\build\src\xpcom\string\nsUTF8Utils.h, line 495
23:37:10 INFO - PROCESS | 3252 | 1477636630859 Marionette TRACE conn5 <- [1,341,null,{"value":["/XMLHttpRequest/open-url-encoding.htm",0,null,null,[["percent encode characters",0,null,null],["lone surrogate should return U+FFFD",0,null,null]]]}]
23:37:10 INFO - ..
23:37:10 INFO - TEST-OK | /XMLHttpRequest/open-url-encoding.htm | took 1378ms
23:37:10 INFO - PROCESS | 3252 | 1477636630909 Marionette TRACE conn5 -> [0,342,"getWindowHandle",null]
23:37:10 INFO - PROCESS | 3252 | 1477636630914 Marionette TRACE conn5 <- [1,342,null,{"value":"13"}]
23:37:10 INFO - TEST-START | /XMLHttpRequest/open-url-fragment.htm
23:37:10 INFO - PROCESS | 3252 | 1477636630922 Marionette TRACE conn5 -> [0,343,"executeScript",{"scriptTimeout":null,"newSandbox":true,"args":[],"filename":"executormarionette.py","script":"if (window.wrappedJSObject.win) {window.wrappedJSObject.win.close()}","sandbox":"default","line":430}]
23:37:11 INFO - PROCESS | 3252 | 1477636631043 Marionette TRACE conn5 <- [1,343,null,{"value":null}]
23:37:11 INFO - PROCESS | 3252 | 1477636631050 Marionette TRACE conn5 -> [0,344,"getWindowHandles",null]
23:37:11 INFO - PROCESS | 3252 | 1477636631053 Marionette TRACE conn5 <- [1,344,null,["13"]]
23:37:11 INFO - PROCESS | 3252 | 1477636631058 Marionette TRACE conn5 -> [0,345,"switchToWindow",{"name":"13"}]
23:37:11 INFO - PROCESS | 3252 | 1477636631064 Marionette TRACE conn5 <- [1,345,null,{}]
23:37:11 INFO - PROCESS | 3252 | 1477636631068 Marionette TRACE conn5 -> [0,346,"executeAsyncScript",{"scriptTimeout":null,"sandbox":"default","debug_script":false,"script":"/* This Source Code Form is subject to the terms of the Mozilla Public\n * License, v. 2.0. If a copy of the MPL was not distributed with this\n * file, You can obtain one at http://mozilla.org/MPL/2.0/. */\n\nwindow.wrappedJSObject.timeout_multiplier = 3;\nwindow.wrappedJSObject.explicit_timeout = 0;\n\nwindow.wrappedJSObject.addEventListener(\"message\", function listener(event) {\n if (event.data.type != \"complete\") {\n return;\n }\n window.wrappedJSObject.removeEventListener(\"message\", listener);\n clearTimeout(timer);\n var tests = event.data.tests;\n var status = event.data.status;\n\n var subtest_results = tests.map(function(x) {\n return [x.name, x.status, x.message, x.stack]\n });\n\n marionetteScriptFinished([\"/XMLHttpRequest/open-url-fragment.htm\",\n status.status,\n status.message,\n status.stack,\n subtest_results]);\n}, false);\n\nwindow.wrappedJSObject.win = window.open(\"http://web-platform.test:8000/XMLHttpRequest/open-url-fragment.htm\", \"9298bc64-aba3-4cf2-8943-12823d317f6b\");\n\nvar timer = null;\nif (30000) {\n timer = setTimeout(function() {\n log(\"Timeout fired\");\n window.wrappedJSObject.win.timeout();\n }, 30000);\n}\n","newSandbox":false,"line":445,"args":[],"filename":"executormarionette.py"}]
23:37:11 INFO - PROCESS | 3252 | ++DOCSHELL 000000E24DEDE000 == 28 [pid = 3252] [id = 79]
23:37:11 INFO - PROCESS | 3252 | ++DOMWINDOW == 82 (000000E24DEDF000) [pid = 3252] [serial = 233] [outer = 0000000000000000]
23:37:11 INFO - PROCESS | 3252 | ++DOMWINDOW == 83 (000000E24DF57800) [pid = 3252] [serial = 234] [outer = 000000E24DEDF000]
23:37:11 INFO - PROCESS | 3252 | 1477636631129 Marionette DEBUG loaded listener.js
23:37:11 INFO - PROCESS | 3252 | ++DOMWINDOW == 84 (000000E24DF59000) [pid = 3252] [serial = 235] [outer = 000000E24DEDF000]
23:37:11 INFO - PROCESS | 3252 | 1477636631527 Marionette TRACE conn5 <- [1,346,null,{"value":["/XMLHttpRequest/open-url-fragment.htm",0,null,null,[["XMLHttpRequest: open() resolving URLs - fragment identifier",0,null,null],["make sure fragment is removed from URL before request",0,null,null],["make sure fragment is removed from URL before request (with query string)",0,null,null],["make sure escaped # is not removed",0,null,null]]]}]
23:37:11 INFO - ....
23:37:11 INFO - TEST-OK | /XMLHttpRequest/open-url-fragment.htm | took 629ms
23:37:11 INFO - PROCESS | 3252 | 1477636631551 Marionette TRACE conn5 -> [0,347,"getWindowHandle",null]
23:37:11 INFO - PROCESS | 3252 | 1477636631555 Marionette TRACE conn5 <- [1,347,null,{"value":"13"}]
23:37:11 INFO - TEST-START | /XMLHttpRequest/open-url-javascript-window-2.htm
23:37:11 INFO - PROCESS | 3252 | 1477636631559 Marionette TRACE conn5 -> [0,348,"executeScript",{"scriptTimeout":null,"newSandbox":true,"args":[],"filename":"executormarionette.py","script":"if (window.wrappedJSObject.win) {window.wrappedJSObject.win.close()}","sandbox":"default","line":430}]
23:37:11 INFO - PROCESS | 3252 | 1477636631664 Marionette TRACE conn5 <- [1,348,null,{"value":null}]
23:37:11 INFO - PROCESS | 3252 | 1477636631671 Marionette TRACE conn5 -> [0,349,"getWindowHandles",null]
23:37:11 INFO - PROCESS | 3252 | 1477636631673 Marionette TRACE conn5 <- [1,349,null,["13"]]
23:37:11 INFO - PROCESS | 3252 | 1477636631678 Marionette TRACE conn5 -> [0,350,"switchToWindow",{"name":"13"}]
23:37:11 INFO - PROCESS | 3252 | 1477636631682 Marionette TRACE conn5 <- [1,350,null,{}]
23:37:11 INFO - PROCESS | 3252 | 1477636631686 Marionette TRACE conn5 -> [0,351,"executeAsyncScript",{"scriptTimeout":null,"sandbox":"default","debug_script":false,"script":"/* This Source Code Form is subject to the terms of the Mozilla Public\n * License, v. 2.0. If a copy of the MPL was not distributed with this\n * file, You can obtain one at http://mozilla.org/MPL/2.0/. */\n\nwindow.wrappedJSObject.timeout_multiplier = 3;\nwindow.wrappedJSObject.explicit_timeout = 0;\n\nwindow.wrappedJSObject.addEventListener(\"message\", function listener(event) {\n if (event.data.type != \"complete\") {\n return;\n }\n window.wrappedJSObject.removeEventListener(\"message\", listener);\n clearTimeout(timer);\n var tests = event.data.tests;\n var status = event.data.status;\n\n var subtest_results = tests.map(function(x) {\n return [x.name, x.status, x.message, x.stack]\n });\n\n marionetteScriptFinished([\"/XMLHttpRequest/open-url-javascript-window-2.htm\",\n status.status,\n status.message,\n status.stack,\n subtest_results]);\n}, false);\n\nwindow.wrappedJSObject.win = window.open(\"http://web-platform.test:8000/XMLHttpRequest/open-url-javascript-window-2.htm\", \"9298bc64-aba3-4cf2-8943-12823d317f6b\");\n\nvar timer = null;\nif (30000) {\n timer = setTimeout(function() {\n log(\"Timeout fired\");\n window.wrappedJSObject.win.timeout();\n }, 30000);\n}\n","newSandbox":false,"line":445,"args":[],"filename":"executormarionette.py"}]
23:37:11 INFO - PROCESS | 3252 | ++DOCSHELL 000000E2534A0800 == 29 [pid = 3252] [id = 80]
23:37:11 INFO - PROCESS | 3252 | ++DOMWINDOW == 85 (000000E2534A3000) [pid = 3252] [serial = 236] [outer = 0000000000000000]
23:37:11 INFO - PROCESS | 3252 | ++DOMWINDOW == 86 (000000E253704800) [pid = 3252] [serial = 237] [outer = 000000E2534A3000]
23:37:11 INFO - PROCESS | 3252 | 1477636631744 Marionette DEBUG loaded listener.js
23:37:11 INFO - PROCESS | 3252 | ++DOMWINDOW == 87 (000000E253717000) [pid = 3252] [serial = 238] [outer = 000000E2534A3000]
23:37:12 INFO - PROCESS | 3252 | ++DOCSHELL 000000E254510000 == 30 [pid = 3252] [id = 81]
23:37:12 INFO - PROCESS | 3252 | ++DOMWINDOW == 88 (000000E256F18800) [pid = 3252] [serial = 239] [outer = 0000000000000000]
23:37:12 INFO - PROCESS | 3252 | ++DOMWINDOW == 89 (000000E256F19800) [pid = 3252] [serial = 240] [outer = 000000E256F18800]
23:37:12 INFO - PROCESS | 3252 | 1477636632166 Marionette TRACE conn5 <- [1,351,null,{"value":["/XMLHttpRequest/open-url-javascript-window-2.htm",0,null,null,[["XMLHttpRequest: open() - resolving URLs (javascript: